The security of public key cryptosystems based on integer factorization

9Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Public-key encryption schemes are substantially slower than symmetric-key encryption algorithms. Therefore public-key encryption is used in practice together with symmetric algorithms in hybrid systems. The paper gives a survey of the state of art in public-key cryptography. Thereby special attention is payed to the different realizations of RSA-type cryptosystems. Though EIGamal-type cryptosystems on elliptic curves are of great interest in light of recent advances, the original RSA-cryptosystem is still the most widely used public-key procedure. After a comparison of public-key cryptosystems based on integer factorization and discrete logarithms a detailed cryptanalysis of RSA-type cryptosystems is given. Known strengths and weaknesses are described and recommendations for the choice of secure parameters are given. Obviously the RSA cryptosystem can be broken if its modulus can be factored. It is an open question if breaking RSA is equivalent to factoring the modulus. The paper presents several modified RSA cryptosystems for which breaking is as difficult as factoring the modulus and gives a general theory for such systems.

Cite

CITATION STYLE

APA

Müller, S., & Müller, W. B. (1998). The security of public key cryptosystems based on integer factorization. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1438, pp. 9–23). Springer Verlag. https://doi.org/10.1007/bfb0053717

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free