Factorization of big integer and the security of RSA
Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of t...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2017-05-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00166 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850073098332667904 |
|---|---|
| author | Yan-bing REN |
| author_facet | Yan-bing REN |
| author_sort | Yan-bing REN |
| collection | DOAJ |
| description | Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given. |
| format | Article |
| id | doaj-art-ce8cf81cafbf4802b3712422c7e63f4c |
| institution | DOAJ |
| issn | 2096-109X |
| language | English |
| publishDate | 2017-05-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-ce8cf81cafbf4802b3712422c7e63f4c2025-08-20T02:46:56ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-05-013626959550600Factorization of big integer and the security of RSAYan-bing RENThree kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00166integerfactorizationRSAkey sizesecurity |
| spellingShingle | Yan-bing REN Factorization of big integer and the security of RSA 网络与信息安全学报 integer factorization RSA key size security |
| title | Factorization of big integer and the security of RSA |
| title_full | Factorization of big integer and the security of RSA |
| title_fullStr | Factorization of big integer and the security of RSA |
| title_full_unstemmed | Factorization of big integer and the security of RSA |
| title_short | Factorization of big integer and the security of RSA |
| title_sort | factorization of big integer and the security of rsa |
| topic | integer factorization RSA key size security |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00166 |
| work_keys_str_mv | AT yanbingren factorizationofbigintegerandthesecurityofrsa |