IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 9    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 9, September 2011
Attack on RSA Cryptosystem
Full Text(PDF, 3000)  PP.  
Sachin Upadhyay
Cryptology, Cryptography, Cryptanalysis, CRT, Decryption, Encryption, RSA.
The RSA Cryptosystem developed in 1977, by three peoples: Ronald Rivest, Adi Shamir & Len Adleman which is based upon the difficulty of factorization of two large primes. The cryptosystem is most commonly used for providing privacy and ensuring authencity of digital data. These days RSA is deployed in many commercial systems. It is used by web servers and browsers to secure web traffic, it is used to secure login sessions and it is at the heart of electronic credit card payment systems. So we can say that RSA is very frequently used in some or the other applications. The RSA Cryptosystem has been analysed for vulnerability by many researchers. Although the past work has proven that none of the attacks on RSA cryptosystem were dangerous. Indeed most of the dangers were because of improper use of RSA. Our goal is to survey some of these attacks and describe the underlying mathematical tools they use. Throughout the survey we follow standard naming conventions and use Alice and Bob to denote two generic parties wishing to communicate with each other. We use Marvin to denote a malicious attacker wishing to eavesdrop or tamper with the communication between Alice and Bob.
[1] D. Boneh, G.Durfee. New results on cryptanalysis of low private exponent RSA. Preprint, 1998.

[2] D.Bleichenbacher. chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS 1. In CRYPTO ’98, volume 1462 of Lecture Notes in Computer Science, pages 1-12, Springer-Verlag, 1998

[3] D. Boneh, R.DeMillo and R. Lipton. On the importance of checking cryptographic protocols for faults. In EUROCRYPT ’97, volume 1233 of Lectuer Notes in Computer Science, pages 37 51.Springer-Verlag, 1997.

[4] P.Kocher. Timing attacks on implementations od Diffie-Hellman, RSA, DSS and other systems. In CRYPTO’96, volume 1109 of lecture Notes in Computer Science, pages 104 113 Springer-Verlag, 1996.

[5] J.Hastad Solving simultaneous modular equations of low degree, SIAM J. of Computing, 17:336-341, 1988.

Untitled Page