Analysis of secret-key algorithm vulnerability in RSA-cryptosystems
Автор: Alekseev Aleksander Petrovich
Журнал: Инфокоммуникационные технологии @ikt-psuti
Рубрика: Электромагнитная совместимость и безопасность оборудования
Статья в выпуске: 4 т.13, 2015 года.
Бесплатный доступ
This work describes results of analysis of public - and private-key generation algorithms in asymmetric RSA-cryptosystems. We demonstrated that RSA-cryptosystem can be compromised not only by large number factorization. Under Euler function value is multiple to 10, there is a probability of occurrence of two same public keys, when formed open exponents end in 1 or 9. 8 lemmas are described and proven with theoretical justification of same public keys occurrence. It is recommended to produce a complete test on full match of public- and private-key during key generation to improve vulnerability protection of cryptosystem.
Cryptography, asymmetric cryptosystem, vulnerability, secret key, public key, euler function, lemma, prime, even number, odd number, fermat numbers
Короткий адрес: https://sciup.org/140191799
IDR: 140191799 | DOI: 10.18469/ikt.2015.13.4.17