Factorization of big integer and the security of RSA

Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of t...

Full description

Bibliographic Details
Main Author: Yan-bing REN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-05-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00166
_version_ 1818212896256032768
author Yan-bing REN
author_facet Yan-bing REN
author_sort Yan-bing REN
collection DOAJ
description Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given.
first_indexed 2024-12-12T05:55:40Z
format Article
id doaj.art-e483b9b767694785af0f3cead066b313
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-12-12T05:55:40Z
publishDate 2017-05-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-e483b9b767694785af0f3cead066b3132022-12-22T00:35:34ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-05-0135626910.11959/j.issn.2096-109x.2017.00166Factorization of big integer and the security of RSAYan-bing REN0School of Cyber Engineering,Xidian University,Xi’an 710071,ChinaThree kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00166integerfactorizationrsakey sizesecurity
spellingShingle Yan-bing REN
Factorization of big integer and the security of RSA
网络与信息安全学报
integer
factorization
rsa
key size
security
title Factorization of big integer and the security of RSA
title_full Factorization of big integer and the security of RSA
title_fullStr Factorization of big integer and the security of RSA
title_full_unstemmed Factorization of big integer and the security of RSA
title_short Factorization of big integer and the security of RSA
title_sort factorization of big integer and the security of rsa
topic integer
factorization
rsa
key size
security
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00166
work_keys_str_mv AT yanbingren factorizationofbigintegerandthesecurityofrsa