期刊论文详细信息
Defence Science Journal
On Deterministic Polynomial-time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
Subhamoy Maitra1  Santanu Sarkar1 
[1] Indian Statistical Institute, Kolkata
关键词: Cryptanalysis;    Ciphertext;    Ciphertext-only attack;    Cost;    Particle Swarm Optimization;    Plaintext;    Simplified-AES.;   
DOI  :  
学科分类:社会科学、人文和艺术(综合)
来源: Defence Scientific Information & Documentation Centre
PDF
【 摘 要 】

Let N = pq be the product of two large primes. Consider Chinese remainder theorem-Rivest, Shamir, Adleman (CRT-RSA) with the public encryption exponent e and private decryption exponents dp, dq. It is well known that given any one of dp or dq (or both) one can factorise N in probabilistic poly(log N) time with success probability almost equal to 1. Though this serves all the practical purposes, from theoretical point of view, this is not a deterministic polynomial time algorithm. In this paper, we present a lattice-based deterministic poly(log N) time algorithm that uses both dp, dq (in addition to the public information e, N) to factorise N for certain ranges of dp, dq. We like to stress that proving the equivalence for all the values of dp, dq may be a nontrivial task. Defence Science Journal, 2012, 62(2), pp.122-126 ,  DOI:http://dx.doi.org/10.14429/dsj. 62.1716

【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO201912010140216ZK.pdf 480KB PDF download
  文献评价指标  
  下载次数:5次 浏览次数:11次