Security problem in chosen a cryptografic methods

Wojciech Ambrozik, Romuald Błaszczyk

Abstract


The aim of the paper is to compare modern algorithms of factorization in the context of RSA cryptosystem. Author presents results of practical experiments based on different methods and evaluations of their efficiency. Obtained results needed thorough analysis of formalization ofthese methods. Because of limitations of the paper it is not possible to present the whole analysis.

Keywords


security; RSA; cryptoanalytic

Full Text:

PDF (Polski)

References


Gehani A., LaBean T.H., Reif J.H.: DNA - based cryptography. Springer, 2004.

Blake J : Krzywe eliptyczne w kryptografii. WNT, Warszawa 2004.

Hoffstein J., Pipher J., Silverman J.H.: An introduction to mathematical cryptography. Springer, 2009.

Menezes A.J., Oorschot P.C., Vanstone S.A.: Kryptografia stosowana. WNT, Warszawa

Childs L.N.: A concrete introduction to higher algebra. Springer, 2009.

Koblitz N.: Algebraiczne aspekty kryptografii. WNT, Warszawa 2000.

Koblitz N.:Wykład Wykład z teorii liczb i kryptografii. WNT, Warszawa 2006.

Stinson D.R.: Kryptografia w teorii i w praktyce. WNT, Warszawa 2005.

Yan S. Y.: Teoria liczb w informatyce. WNT, Warszawa 2006.

Yan S Y.: Cryptoanalytic attacks on RSA. Springer, 2008.

Grzywak A., Klamka J., Kapczyński A., Sobota M.: Współczesne problemy bezpieczeństwa informacji. WSB,2008.




DOI: http://dx.doi.org/10.21936/si2010_v31.n2B.401