An M3 Public-Key Encryption Scheme

30Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

It is well known that the RSA public-key cryptosystem can be broken if the composite modulus can be factored. It is nor known, however, whether the problem of breaking any RSA system is equivalent in difficulty to factoring the modulus. In 1979 Rabin [5] introduced a public-key cryptosystem which is as difficult to break as it is to factor a modulus R=p1p2, where p1p2 are two distinct large primes. Esaentially Rabin suggested that the designer of such a scheme first determine p1 and p2, keep them secret and make R public. Anyone wishing to send a secure message H (0 < M < R) to the designer would encrypt M as K, where (Formula presented.) and 0 < K < R, then transmit K to the designer.

Cite

CITATION STYLE

APA

Williams, H. C. (1986). An M3 Public-Key Encryption Scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 218 LNCS, pp. 358–368). Springer Verlag. https://doi.org/10.1007/3-540-39799-X_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free