11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

1 Introduction 1<br />

1.1 Encryption and Decryption . . . . . . . . . . . . . . . . . . . . . . 2<br />

1.2 Symmetric Key Cryptography . . . . . . . . . . . . . . . . . . . . . 3<br />

1.3 Asymmetric Key Cryptography . . . . . . . . . . . . . . . . . . . . 5<br />

1.4 Goal <strong>of</strong> this Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />

1.5 Organization <strong>of</strong> the Thesis . . . . . . . . . . . . . . . . . . . . . . . 7<br />

1.6 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />

2 Mathematical Preliminaries 11<br />

2.1 Asymptotic Notation . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />

2.2 <strong>RSA</strong> Cryptosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br />

2.2.1 Classical Model <strong>of</strong> <strong>RSA</strong> . . . . . . . . . . . . . . . . . . . . 13<br />

2.2.2 Implementation <strong>of</strong> <strong>RSA</strong> . . . . . . . . . . . . . . . . . . . . 15<br />

2.2.3 Variants <strong>of</strong> <strong>RSA</strong> . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />

2.3 <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br />

2.3.1 Factoring <strong>RSA</strong> Modulus . . . . . . . . . . . . . . . . . . . . 23<br />

2.3.2 Partial Exposure <strong>of</strong> Primes . . . . . . . . . . . . . . . . . . . 24<br />

2.3.3 Small Public Exponent Attack . . . . . . . . . . . . . . . . . 24<br />

2.3.4 Related Message Attack . . . . . . . . . . . . . . . . . . . . 24<br />

2.3.5 Broadcast Attack . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

2.3.6 Timing Attack . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!