11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5 1.3 Asymmetric Key Cryptography<br />

this communication. Now, in case <strong>of</strong> such a dispute, Bob will have to prove<br />

to an unbiased arbitrator (may be the judge or jury at the court) that the<br />

message was in fact sent by Alice. Now, the arbitrator can not verify who<br />

actually encrypted/signed that particular plaintext, as both Alice and Bob<br />

are capable <strong>of</strong> encrypting/signing it using the same (shared) key. This problem<br />

<strong>of</strong> authentication is known as repudiation. This problem can not be<br />

solved using symmetric key systems, as the concept <strong>of</strong> non-repudiation using<br />

signatures can not be accomplished.<br />

To overcome these problems, Diffie and Hellman [33] introduced the notion <strong>of</strong><br />

‘asymmetric key’ cryptosystems in 1976. Invention <strong>of</strong> asymmetric key cryptosystems<br />

is arguably the most celebrated breakthrough in modern day cryptography.<br />

However, one should note that public key cryptosystems are much slower than<br />

symmetric key cryptosystems in general.<br />

1.3 Asymmetric Key Cryptography<br />

In asymmetric key cryptography, the encryption and the decryption keys are different,<br />

but they are related by some mathematical relation. These type <strong>of</strong> cryptosystems<br />

are also called ‘public key’ cryptosystems, as the encryption key is made<br />

public while the decryption key is kept secret. Hence, it is required for the security<br />

<strong>of</strong> the system that, finding the decryption key from the encryption key is<br />

computationally infeasible.<br />

The public key cryptosystems are most <strong>of</strong>ten based on some computationally<br />

hard mathematical problem. A list <strong>of</strong> well known hard problems is as follows.<br />

Integer <strong>Factorization</strong> Problem (IFP). The problem is to find a proper factor<br />

<strong>of</strong> a given positive integer N > 1. The first usable public key cryptosystem<br />

<strong>RSA</strong> [110] is based on the hardness <strong>of</strong> integer factorization problem. Rabin<br />

cryptosystem [104] is also based on integer factorization problem.<br />

Quadratic Residue Problem (QRP). The problem is to decide whether an<br />

element x ∈ Z N has a modular square root where N is a composite number.<br />

It can be proved that if factorization <strong>of</strong> N is known then QRP in Z N is no<br />

longer hard. Goldwasser-Micali [45] cryptosystem is based on QRP.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!