핵심 개념
RSA+ combines RSA and Rabin schemes for improved security and efficiency.
초록
The content introduces the RSA+ cryptosystem, combining elements of RSA and Rabin schemes. It explores the motivation behind creating RSA+, comparing it to traditional RSA and Rabin systems in terms of security, performance, and practicality. The runtime analysis reveals that breaking RSA+ is as difficult as breaking RSA, with implications for factoring large moduli. The decryption process of RSA+ is discussed in detail, highlighting advantages over Rabin's scheme in producing at most two possible decrypted messages. Security implications are explored, suggesting that breaking RSA+ may be equivalent to factoring the modulus n. The article concludes by discussing the number of possible clear texts output during decryption and acknowledges contributions from various authors.
Introduction:
Introducing a new probabilistic public-key cryptosystem called RSA+
Combines elements of well-known RSA and Rabin cryptosystems
Motivation for Creating RSA+:
Aimed to create a more practical system than Rabin's while maintaining high security levels
Runtime Analysis:
Breaking RSA+ is as challenging as breaking traditional RSA
Implications for factoring large moduli
Decryption Process:
Advantages of producing at most two possible decrypted messages compared to Rabin's four
Security Implications:
Breaking RSA+ may be equivalent to factoring the modulus n
Conclusion:
Discussion on the number of possible clear texts output during decryption
Acknowledgment section recognizing contributions from various authors
통계
"Bob’s public key is (n, e) where e is 2020 Mathematics Subject Classification."
"Let p and q be two large distinct prime numbers of size at least 1500 bits each."
"In our tests, we observed an accuracy of formula (4.1) of roughly 99%."
인용구
"It seems reasonable to expect that breaking our new algorithm is equivalent to factoring the large modulus n."
"The runtime analysis reveals that breaking RSA+ is as difficult as breaking traditional RSA."