Factorization of big integer and the security of RSA
Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of t...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-05-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00166 |
_version_ | 1818212896256032768 |
---|---|
author | Yan-bing REN |
author_facet | Yan-bing REN |
author_sort | Yan-bing REN |
collection | DOAJ |
description | Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given. |
first_indexed | 2024-12-12T05:55:40Z |
format | Article |
id | doaj.art-e483b9b767694785af0f3cead066b313 |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-12-12T05:55:40Z |
publishDate | 2017-05-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-e483b9b767694785af0f3cead066b3132022-12-22T00:35:34ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-05-0135626910.11959/j.issn.2096-109x.2017.00166Factorization of big integer and the security of RSAYan-bing REN0School of Cyber Engineering,Xidian University,Xi’an 710071,ChinaThree kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00166integerfactorizationrsakey sizesecurity |
spellingShingle | Yan-bing REN Factorization of big integer and the security of RSA 网络与信息安全学报 integer factorization rsa key size security |
title | Factorization of big integer and the security of RSA |
title_full | Factorization of big integer and the security of RSA |
title_fullStr | Factorization of big integer and the security of RSA |
title_full_unstemmed | Factorization of big integer and the security of RSA |
title_short | Factorization of big integer and the security of RSA |
title_sort | factorization of big integer and the security of rsa |
topic | integer factorization rsa key size security |
url | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00166 |
work_keys_str_mv | AT yanbingren factorizationofbigintegerandthesecurityofrsa |