Attacks on weak implementations of RSA

RSA an acronym which comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman who first publicly described the algorithm in 1977, is one of the first practicable public-key cryptosystem that is widely used to secure data transmitted digitally in the public. Since then, researchers and c...

Full description

Saved in:
Bibliographic Details
Main Author: Kok, Zi Ming
Other Authors: Tay Kian Boon
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/148138
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-148138
record_format dspace
spelling sg-ntu-dr.10356-1481382021-04-24T04:28:28Z Attacks on weak implementations of RSA Kok, Zi Ming Tay Kian Boon School of Computer Science and Engineering kianboon.tay@ntu.edu.sg Engineering::Computer science and engineering RSA an acronym which comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman who first publicly described the algorithm in 1977, is one of the first practicable public-key cryptosystem that is widely used to secure data transmitted digitally in the public. Since then, researchers and cryptanalysts have been looking for ways to attack it. Though long years of research had produced numerous attacks on it, none of them is successful if the algorithm is implemented correctly and the device implementing it does not leak any or enough information on the primes or the secret key used during the execution of the algorithm. This project will be looking into the attacks targeting some of the weak implementations of RSA. The project focuses on attacks such as using Wiener theorem to break implementations that used short private key for the algorithm, Coron’s simplified approach with Coppersmith theorem to break implementations that have partial exposure of the parameter primes used during execution of the algorithm, and attacks on some of the possible misconfigurations used by the developers or vendors. Bachelor of Engineering (Computer Science) 2021-04-24T04:28:28Z 2021-04-24T04:28:28Z 2021 Final Year Project (FYP) Kok, Z. M. (2021). Attacks on weak implementations of RSA. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148138 https://hdl.handle.net/10356/148138 en SCSE20-0161 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
spellingShingle Engineering::Computer science and engineering
Kok, Zi Ming
Attacks on weak implementations of RSA
description RSA an acronym which comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman who first publicly described the algorithm in 1977, is one of the first practicable public-key cryptosystem that is widely used to secure data transmitted digitally in the public. Since then, researchers and cryptanalysts have been looking for ways to attack it. Though long years of research had produced numerous attacks on it, none of them is successful if the algorithm is implemented correctly and the device implementing it does not leak any or enough information on the primes or the secret key used during the execution of the algorithm. This project will be looking into the attacks targeting some of the weak implementations of RSA. The project focuses on attacks such as using Wiener theorem to break implementations that used short private key for the algorithm, Coron’s simplified approach with Coppersmith theorem to break implementations that have partial exposure of the parameter primes used during execution of the algorithm, and attacks on some of the possible misconfigurations used by the developers or vendors.
author2 Tay Kian Boon
author_facet Tay Kian Boon
Kok, Zi Ming
format Final Year Project
author Kok, Zi Ming
author_sort Kok, Zi Ming
title Attacks on weak implementations of RSA
title_short Attacks on weak implementations of RSA
title_full Attacks on weak implementations of RSA
title_fullStr Attacks on weak implementations of RSA
title_full_unstemmed Attacks on weak implementations of RSA
title_sort attacks on weak implementations of rsa
publisher Nanyang Technological University
publishDate 2021
url https://hdl.handle.net/10356/148138
_version_ 1698713724944121856