Movatterモバイル変換


[0]ホーム

URL:


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Regular Section
Short-Exponent RSA
Hung-Min SUNCheng-Ta YANGMu-En WU
Author information
  • Hung-Min SUN

    National Tsing Hua University

  • Cheng-Ta YANG

    National Cheng Kung University

  • Mu-En WU

    National Tsing Hua University

Corresponding author

ORCID
Keywords:RSA,encryption,digital signature,public-key cryptosystem
JOURNALRESTRICTED ACCESS

2009 Volume E92.AIssue 3Pages 912-918

DOIhttps://doi.org/10.1587/transfun.E92.A.912
Details
  • Published: March 01, 2009Received: January 23, 2008Available on J-STAGE: March 01, 2009Accepted: -Advance online publication: -Revised: -
Download PDF(216K)
Download citationRIS

(compatible with EndNote, Reference Manager, ProCite, RefWorks)

BIB TEX

(compatible with BibDesk, LaTeX)

Text
How to download citation
Contact us
Article overview
Share
Abstract
In some applications, a short private exponentd is chosen to improve the decryption or signing process for RSA public key cryptosystem. However, in a typical RSA, if the private exponentd is selected first, the public exponente should be of the same order of magnitude asφ(N). Sun et al. devised three RSA variants using unbalanced prime factorsp andq to lower the computational cost. Unfortunately, Durfee & Nguyen broke the illustrated instances of the first and third variants by solving small roots to trivariate modular polynomial equations. They also indicated that the instances with unbalanced primesp andq are more insecure than the instances with balancedp andq. This investigation focuses on designing a new RSA variant with balancedp andq, and short exponentsd ande, to improve the security of an RSA variant against the Durfee & Nguyen's attack, and the other existing attacks. Furthermore, the proposed variant (Scheme A) is also extended to another RSA variant (Scheme B) in whichp andq are balanced, and a trade-off between the lengths ofd ande is enable. In addition, we provide the security analysis and feasibility analysis of the proposed schemes.
References (27)
Related articles (0)
Figures (0)
Content from these authors
Supplementary material (0)
Result List ()
Cited by (0)
© 2009 The Institute of Electronics, Information and Communication Engineers
Previous articleNext article
Favorites & Alerts
Related articles

Recently viewed articles
    Announcements from publisher
    Share this page
    feedback
    Top

    Register with J-STAGE for free!

    Register

    Already have an account? Sign inhere


    [8]ページ先頭

    ©2009-2025 Movatter.jp