Extending the Wiener attack to RSA-type cryptosystems
Extending the Wiener attack to RSA-type cryptosystems
- Author(s): R.G.E. Pinch
- DOI: 10.1049/el:19951199
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Electronics Letters — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): R.G.E. Pinch 1
-
-
View affiliations
-
Affiliations:
1: Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, Cambridge, United Kingdom
-
Affiliations:
1: Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, Cambridge, United Kingdom
- Source:
Volume 31, Issue 20,
28 September 1995,
p.
1736 – 1738
DOI: 10.1049/el:19951199 , Print ISSN 0013-5194, Online ISSN 1350-911X
The author shows that the attack of Wiener on RSA cryptosystems with a short deciphering exponent extends to systems using other groups such as elliptic curves, and LUC.
Inspec keywords: public key cryptography
Other keywords:
Subjects: Data security; Codes
References
-
-
1)
- R.L. Rivest , A. Shamir , L. Adleman . A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM , 2 , 120 - 126
-
2)
- V.S. Miller . (1986) Use of elliptic curves in cryptography, Advances in cryptology - CRYPTO'85.
-
3)
- J.H. Silverman . (1986) The arithmetic of elliptic curves, Graduate texts in mathematics.
-
4)
- C.-S. Lai , F.-K. Tu , W.-C. Tai . Remarks on LUC public key system. Electron. Lett. , 2 , 123 - 124
-
5)
- P. Smith . LUC public key encryption: a secure alternative to RSA. Dr. Dobb's J. , 1 , 44 - 49
-
6)
- M.J. Wiener . Cryptanalysis of short RSA secret exponents. IEEE Trans. , 3 , 553 - 558
-
7)
- K. Koyama , U.M. Maurer , T. Okamoto , S.A. Vanstone , J. Feigenbaum . (1992) New public-key systems based on elliptic curves over the ring , Advances in cryptology - CRYPTO'91.
-
8)
- S. Murphy . Comment: Remarks on the LUC public key system. Electron. Lett. , 7 , 558 - 559
-
9)
- P. Smith , M.J.J. Lennon . LUC - a new public-key system. IFIP Trans. A, Comput. Sci. Technol. , 103 - 117
-
10)
- I. Niven , H.S. Zuckerman . (1966) An introduction to the theory of numbers.
-
11)
- J.W.S. Cassels . (1991) Elliptic curves, LMS student texts.
-
12)
- H. Kuwakado , K. Koyama . Efficient cryptosystems over elliptic curves based on a product of form-freeprimes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. , 8 , 1309 - 1318
-
13)
- A.J. Menezes . (1993) Elliptic curve public key cryptosystems.
-
14)
- G.H. Hardy , E.M. Wright . (1960) The theory of numbers.
-
15)
- N. Demytko . (1994) A new elliptic curve based analogue of RSA, Advances in cryptology - EUROCRYPT'93.
-
1)
http://iet.metastore.ingenta.com/content/journals/10.1049/el_19951199
Related content
content/journals/10.1049/el_19951199
pub_keyword,iet_inspecKeyword,pub_concept
6
6