Abstract
This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA design proposal, the public key n is defined as the multiplication of two large prime numbers, while the values of encryption key E and decryption key D are relying on the result of multiplying 2 k large prime numbers called N where n divides N. The GRSA-AA claimed that the brute force is necessary to break the cryptosystem even if the integer n was factored. Nevertheless, this paper aims to show that this scheme is insecure once n is factored. The mathematical proof is presented to show that it is easy to generate an alternative value to the private key D without brute-forcing, yet successfully break the system.
Cite
CITATION STYLE
Isa, M. A. M., Rahmany, N. N. A., Asbullah, M. A., Sathar, M. H. A., & Rasedee, A. F. N. (2019). On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem. In Journal of Physics: Conference Series (Vol. 1366). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1366/1/012021
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.