RSA+: An RSA variant
- URL: http://arxiv.org/abs/2301.01282v2
- Date: Mon, 25 Mar 2024 12:25:14 GMT
- Title: RSA+: An RSA variant
- Authors: Soeren Kleine, Andreas Nickel, Torben Ritter, Krishnan Shankar,
- Abstract summary: We introduce a new probabilistic public-key cryptosystem which combines the main ingredients of the well-known RSA and Rabin cryptosystems.
We investigate the security and performance of our new scheme in comparison to the other two.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: We introduce a new probabilistic public-key cryptosystem which combines the main ingredients of the well-known RSA and Rabin cryptosystems. We investigate the security and performance of our new scheme in comparison to the other two.
Related papers
- Quantum inspired factorization up to 100-bit RSA number in polynomial time [0.0]
We attack the RSA factorization building on Schnorr's mathematical framework.
We factorize RSA numbers up to 256 bits encoding the optimization problem in quantum systems.
Results do not currently undermine the security of the present communication infrastructure.
arXiv Detail & Related papers (2024-10-21T18:00:00Z) - Public-key encryption from a trapdoor one-way embedding of $SL_2(\mathbb{N}$) [0.04662017507844856]
We obfuscate words of a given length in a free monoid on two generators with a simple factorization algorithm to create a public-key encryption scheme.
We provide a reference implementation in Python and suggested parameters.
arXiv Detail & Related papers (2024-09-11T20:58:11Z) - Two RSA-based Cryptosystems [0.0]
The cryptosystem RSA is a very popular cryptosystem in the study of Cryptography.
In this article, we explore how the idea of a primitive mth root of unity in a ring can be integrated into the Discrete Fourier Transform.
arXiv Detail & Related papers (2024-05-17T18:35:29Z) - Notes on Small Private Key Attacks on Common Prime RSA [0.0]
We point out critical deficiencies in lattice-based cryptanalysis of common prime RSA presented in this paper.
We offer an illustration of small private key attacks on common prime RSA.
arXiv Detail & Related papers (2023-10-19T08:27:18Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - Demystifying the RSA Algorithm: An Intuitive Introduction for Novices in Cybersecurity [0.0]
The RSA algorithm is a crucial component in public-key cryptosystems.
understanding the RSA algorithm typically entails familiarity with number theory, modular arithmetic, and related concepts.
We present an intuitively crafted, student-oriented introduction to the RSA algorithm.
arXiv Detail & Related papers (2023-08-05T04:20:18Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Faster Secure Data Mining via Distributed Homomorphic Encryption [108.77460689459247]
Homomorphic Encryption (HE) is receiving more and more attention recently for its capability to do computations over the encrypted field.
We propose a novel general distributed HE-based data mining framework towards one step of solving the scaling problem.
We verify the efficiency and effectiveness of our new framework by testing over various data mining algorithms and benchmark data-sets.
arXiv Detail & Related papers (2020-06-17T18:14:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.