Cryptanalytic Attacks on Rsa

by
Format: Hardcover
Pub. Date: 2007-11-16
Publisher(s): Springer Verlag
List Price: $129.99

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$35.64
Online:60 Days access
Downloadable:60 Days
$47.52
Online:90 Days access
Downloadable:90 Days
$59.40
Online:120 Days access
Downloadable:120 Days
$71.28
Online:180 Days access
Downloadable:180 Days
$77.22
Online:1825 Days access
Downloadable:Lifetime Access
$118.80
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$77.22*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

Summary

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.Cryptanalytic Attacks on RSA covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first. This is followed by an account of the RSA cryptographic system and its variants.Cryptanalytic Attacks on RSA is designed for a professional audience of practitioners and researchers in industry and academia and as a reference or secondary text for advanced level students in computer science, applied mathematics, electrical & communication engineering.

Author Biography

Song Y. Yan is Professor of Computer Science and Mathematics and Director of the Institute for Research in Applicable Computing at the University of Bedfordshire, England.

Table of Contents

Prefacep. xi
Notationsp. xv
Computational/Mathematical Preliminariesp. 1
Introductionp. 1
Computability, Complexity and Intractabilityp. 4
Efficient Number-Theoretic Algorithmsp. 15
Intractable Number-Theoretic Problemsp. 41
Chapter Notes and Further Readingp. 54
RSA Public-Key Cryptographyp. 55
Introductionp. 55
Public-Key Cryptographyp. 60
RSA Public-Key Cryptographyp. 66
RSA Problem and RSA Assumptionp. 71
RSA-Type Crytposystemsp. 73
Chapter Notes and Further Readingsp. 88
Integer Factorization Attacksp. 91
Introductionp. 91
Fermat Factoring Attackp. 93
The "p ± 1" and ECM Attacksp. 94
Quadratic Sieve Attackp. 98
Successful QS Attackp. 103
Number Field Sieve Attackp. 105
Chapter Notes and Further Readingp. 110
Discrete Logarithm Attacksp. 111
Introductionp. 111
Baby-Step Giant-Step Attackp. 115
Silver-Pohlig-Hellman Attackp. 118
Index Calculus Attacksp. 122
Xedni Calculus Attackp. 127
Chapter Notes and Further Readingp. 132
Quantum Computing Attacksp. 135
Introductionp. 135
Order Finding Problemp. 137
Quantum Order Finding Attackp. 139
Quantum Integer Factorization Attackp. 142
Quantum Discrete Logarithm Attackp. 146
Chapter Notes and Further Readingp. 148
Simple Elementary Attacksp. 149
Introductionp. 149
Guessing Plaintext Attacksp. 150
Blinding Attack on RSA Signaturesp. 151
Guessing ¿(N) Attackp. 152
Guessing d Attackp. 155
eth Root Attackp. 159
Common Modulus Attackp. 161
Fixed-Point Attackp. 164
Chapter Notes and Further Readingsp. 166
Public Exponent Attacksp. 169
Introductionp. 169
A Theorem of Coppersmithp. 170
Short e Attacks for Same Messagesp. 173
Short e Attacks for Related Messagesp. 177
Lattice Attack for Stereotyped Messagesp. 183
Chapter Notes and Further Readingp. 187
Private Exponent Attacksp. 189
Introductionp. 189
Diophantine Attackp. 190
Extended Diophantine Attacksp. 195
Small Private CRT-Exponent Attacksp. 198
Partial Private Key Exposure Attacksp. 201
Chapter Notes and Further Readingp. 205
Side-Channel Attacksp. 207
Introductionp. 207
Modular Exponentiation Revisitedp. 208
Timing Attacksp. 209
Time Attacks on RSA in OpenSSLp. 212
Power (Analysis) Attacksp. 215
Random Fault Attacksp. 216
Chapter Notes and Further Readingp. 222
The Road Aheadp. 223
Introductionp. 223
Elliptic Curve-Based Cryptographyp. 224
Coding-Based Cryptographyp. 225
Lattice-Based Cryptographyp. 227
Quantum Cryptographyp. 229
Conclusionsp. 230
Chapter Notes and Further Readingp. 232
Bibliographyp. 233
Indexp. 251
About the Authorp. 255
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.