Factorization of big integer and the security of RSA

Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of t...

Full description

Saved in:
Bibliographic Details
Main Author: Yan-bing REN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-05-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00166
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850073098332667904
author Yan-bing REN
author_facet Yan-bing REN
author_sort Yan-bing REN
collection DOAJ
description Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given.
format Article
id doaj-art-ce8cf81cafbf4802b3712422c7e63f4c
institution DOAJ
issn 2096-109X
language English
publishDate 2017-05-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-ce8cf81cafbf4802b3712422c7e63f4c2025-08-20T02:46:56ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-05-013626959550600Factorization of big integer and the security of RSAYan-bing RENThree kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00166integerfactorizationRSAkey sizesecurity
spellingShingle Yan-bing REN
Factorization of big integer and the security of RSA
网络与信息安全学报
integer
factorization
RSA
key size
security
title Factorization of big integer and the security of RSA
title_full Factorization of big integer and the security of RSA
title_fullStr Factorization of big integer and the security of RSA
title_full_unstemmed Factorization of big integer and the security of RSA
title_short Factorization of big integer and the security of RSA
title_sort factorization of big integer and the security of rsa
topic integer
factorization
RSA
key size
security
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00166
work_keys_str_mv AT yanbingren factorizationofbigintegerandthesecurityofrsa