Attacks on weak implementations of RSA
RSA an acronym which comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman who first publicly described the algorithm in 1977, is one of the first practicable public-key cryptosystem that is widely used to secure data transmitted digitally in the public. Since then, researchers and c...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/148138 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-148138 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1481382021-04-24T04:28:28Z Attacks on weak implementations of RSA Kok, Zi Ming Tay Kian Boon School of Computer Science and Engineering kianboon.tay@ntu.edu.sg Engineering::Computer science and engineering RSA an acronym which comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman who first publicly described the algorithm in 1977, is one of the first practicable public-key cryptosystem that is widely used to secure data transmitted digitally in the public. Since then, researchers and cryptanalysts have been looking for ways to attack it. Though long years of research had produced numerous attacks on it, none of them is successful if the algorithm is implemented correctly and the device implementing it does not leak any or enough information on the primes or the secret key used during the execution of the algorithm. This project will be looking into the attacks targeting some of the weak implementations of RSA. The project focuses on attacks such as using Wiener theorem to break implementations that used short private key for the algorithm, Coron’s simplified approach with Coppersmith theorem to break implementations that have partial exposure of the parameter primes used during execution of the algorithm, and attacks on some of the possible misconfigurations used by the developers or vendors. Bachelor of Engineering (Computer Science) 2021-04-24T04:28:28Z 2021-04-24T04:28:28Z 2021 Final Year Project (FYP) Kok, Z. M. (2021). Attacks on weak implementations of RSA. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148138 https://hdl.handle.net/10356/148138 en SCSE20-0161 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering |
spellingShingle |
Engineering::Computer science and engineering Kok, Zi Ming Attacks on weak implementations of RSA |
description |
RSA an acronym which comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman who first publicly described the algorithm in 1977, is one of the first practicable public-key cryptosystem that is widely used to secure data transmitted digitally in the public. Since then, researchers and cryptanalysts have been looking for ways to attack it. Though long years of research had produced numerous attacks on it, none of them is successful if the algorithm is implemented correctly and the device implementing it does not leak any or enough information on the primes or the secret key used during the execution of the algorithm.
This project will be looking into the attacks targeting some of the weak implementations of RSA. The project focuses on attacks such as using Wiener theorem to break implementations that used short private key for the algorithm, Coron’s simplified approach with Coppersmith theorem to break implementations that have partial exposure of the parameter primes used during execution of the algorithm, and attacks on some of the possible misconfigurations used by the developers or vendors. |
author2 |
Tay Kian Boon |
author_facet |
Tay Kian Boon Kok, Zi Ming |
format |
Final Year Project |
author |
Kok, Zi Ming |
author_sort |
Kok, Zi Ming |
title |
Attacks on weak implementations of RSA |
title_short |
Attacks on weak implementations of RSA |
title_full |
Attacks on weak implementations of RSA |
title_fullStr |
Attacks on weak implementations of RSA |
title_full_unstemmed |
Attacks on weak implementations of RSA |
title_sort |
attacks on weak implementations of rsa |
publisher |
Nanyang Technological University |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/148138 |
_version_ |
1698713724944121856 |