New Key Generation Algorithm for RSA Cryptosystem (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
For improving the RSA cryptosystem, more desirable conditions on key structures have been intensively studied. Recently, M.J. Wiener presented a cryptanalytic attack on the use of small RSA secret exponents. To be secure against the Wiener's attack, the size of a secret exponent d should be chosen more than one-quarter of the size of the modulus n=pq (in bits). Besides, it is more desirable, in frequent cases, to make the public exponent e as small as possible. However if small d is chosen first, in such case as the digital signature system with smart card, the size of e is inevitably increased to that of n when we use the conventional key generation algorithm. This paper presents a new algorithm, Algorithm I, for generating of the secure RSA keys against Wiener's attack. With Algorithm I, it is possible to choose the smaller sizes of the RSA exponents under certain conditions on key parameters. For example, with Algorithm I, we can construct the RSA keys with the public exponent e of two-thirds and secret exponent d of one-third of the size of modulus n (in bits). Furthermore we present a modified version of Algorithm I, Algorithm II, for generating of the strong RSA keys having the difficulty of factoring n. Finally we analyze the performances of Algorithm I and Algorithm II.
- 社団法人電子情報通信学会の論文
- 1994-01-25
著者
-
Morii Masakatu
Department Of Computer Science Ehime University
-
Kasahara Masao
Department Of Pathology Fujita Health University School Of Medicine
-
Sakai Ryuichi
Department Of Growth Factor Division National Cancer Center Research Institute
-
Kasahara Masao
Department Of Electronics And Information Science Kyoto Institute Of Technology
-
Kasahara Masao
Department Of Electronics And Information Science Faculty Of Engineering And Design Kyoto Institute
-
Sakai Ryuichi
Department Of Electronics And Information Science Kyoto Institute Of Technology
関連論文
- Effects of lectin in the scleractinian coral Ctenactis echinata on symbiotic zooxanthellae
- Characterization of L-amino acid oxidase and antimicrobial activity of aplysianin A, a sea hare-derived antitumor-antimicrobial protein
- Inflammatory pseudotumor of the appendix
- Gastrointestinal stromal tumor of the rectal mesentery
- Warthin-like tumor variant of papillary thyroid carcinoma : Case report and literature review
- Metastasis to the Forearm Skeletal Muscle from an Adenocarcinoma of the Colon : Report of a Case
- Primary primitive neuroectodermal tumor of the kidney
- Angiomyomatous hamartoma and associated stromal lesions in the right inguinal lymph node : A case report
- Solitary squamous cell papilloma of the lung in a 40-year-old woman with recurrent laryngeal papillomatosis
- Clinicopathologic study of primary gastric lymphoma of B cell phenotype with special reference to low-grade B cell lymphoma of mucosa-associated lymphoid tissue among the Japanese
- On Ambiguity in Coppersmith' Attacking Method against NIKS-TAS Scheme (Special Section on Cryptgraphy and Information Security)
- A New Traitor Tracing
- DEVELOPMENT OF CINNAMON-COLORED CL/FR MOUSE, A NEW CONGENIC STRAIN FOR EXPERIMENTAL INVESTIGATION OF CLEFT LIP WITH OR WITHOUT CLEFT PALATE
- Isolation and Characterization of a D-Galactose-binding Lectin from the Acorn Barnacle Balanus rostratus
- Renal Carbonic Anhydrase Activity in DBA/2FG-pcy/pcy Mice with Inherited Polycystic Kidney Disease
- Suppression of gastric cancer dissemination by ephrin-B1-derived peptide
- Fine Needle Aspiration Cytology of Spindle Cell Myoepithelioma in the Submandibular Gland : A case report
- A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme (Asymmetric Cipher) (Cryptography and Information Security)
- An Upper Bound on Frame Error Rate for Generalized Concatenated Convolutional Codes
- A Method for Evaluating Minimum Free Chernov Distance of Trellis-Codes for Discrete Memoryless Channel (Special Section on Information Theory and Its Applications)
- A Class of Trellis-Codes for Partial Response Channel
- High Rate Binary Coset Code Used for Inner Code
- Multi-Dimensional Block Shaping
- An 8-Dimensional Trellis-Coded 8-PSK with Non-zero Crossing Constraint (Special Section on Information Theory and Its Applications)
- Reversible Watermark with Large Capacity Based on the Prediction Error
- Follicular Mixed B-cell Lymphoma Arising in the Submandibular Gland
- Epithelial Myoepithelial Carcinoma of the Salivary Gland: A case report with immunohistochemical examination and three-dimensional imaging
- Expression of HGF/c-Met Gene and Protein in Odontogenic Tumors.
- Epithelial inclusion cyst (epidermoid cyst) formation with epithelioid cell granuloma in an intrapancreatic accessory spleen
- New Key Generation Algorithm for RSA Cryptosystem (Special Section on Cryptography and Information Security)
- New Product-Sum Type Public-Key Cryptosystems with Selectable Encryption Key Based on Chinese Remainder Theorem
- A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications (Information Security)
- A Probabilistic Algorithm for Determining the Minimum Weight of Cyclic Codes (Special Section on Information Theory and Its Applications)
- On the Reliability for the Weight Distribution of LDPC codes Computed by the Probabilistic Algorithm(HISC2006)
- Special Section on Cryptography and Information Security
- Revocable Network Coding Scheme for Specific Networks
- Reversible Watermark Based on Adaptive Embedding
- Invertibility of Functions Involving Circular Shift Operations and the Construction of Hash Functions
- New Methods of Generating Primes Secure against Both P - 1 and P + 1 Methods (Special Section on Information Theory and Its Applications)
- A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations(Public Key Cryptography)(Cryptography and Information Security)
- Detection of mRNA for Keratinocyte Growth Factor and its receptor in human burned skin
- Papillary adenocarcinoma of the subvesical duct
- Fundumental Studies on McEliece's Public-Key Cryptosystem
- Liver injury model in mice for immunopharmacological study.
- Effect of OKY-046 and ONO-3708 on liver injury in mice.