On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem

This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA design proposal, the public key n is defined as the multiplication of two large prime numbers, while the values of encryption key...

Full description

Bibliographic Details
Published in:Journal of Physics: Conference Series
Main Author: Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N.
Format: Conference paper
Language:English
Published: Institute of Physics Publishing 2019
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076082670&doi=10.1088%2f1742-6596%2f1366%2f1%2f012021&partnerID=40&md5=3c89acfa0ac0869a1631d4a8e4bb155a
id 2-s2.0-85076082670
spelling 2-s2.0-85076082670
Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N.
On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
2019
Journal of Physics: Conference Series
1366
1
10.1088/1742-6596/1366/1/012021
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076082670&doi=10.1088%2f1742-6596%2f1366%2f1%2f012021&partnerID=40&md5=3c89acfa0ac0869a1631d4a8e4bb155a
This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA design proposal, the public key n is defined as the multiplication of two large prime numbers, while the values of encryption key E and decryption key D are relying on the result of multiplying 2 k large prime numbers called N where n divides N. The GRSA-AA claimed that the brute force is necessary to break the cryptosystem even if the integer n was factored. Nevertheless, this paper aims to show that this scheme is insecure once n is factored. The mathematical proof is presented to show that it is easy to generate an alternative value to the private key D without brute-forcing, yet successfully break the system. © Published under licence by IOP Publishing Ltd.
Institute of Physics Publishing
17426588
English
Conference paper
All Open Access; Gold Open Access
author Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N.
spellingShingle Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N.
On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
author_facet Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N.
author_sort Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N.
title On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
title_short On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
title_full On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
title_fullStr On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
title_full_unstemmed On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
title_sort On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
publishDate 2019
container_title Journal of Physics: Conference Series
container_volume 1366
container_issue 1
doi_str_mv 10.1088/1742-6596/1366/1/012021
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076082670&doi=10.1088%2f1742-6596%2f1366%2f1%2f012021&partnerID=40&md5=3c89acfa0ac0869a1631d4a8e4bb155a
description This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA design proposal, the public key n is defined as the multiplication of two large prime numbers, while the values of encryption key E and decryption key D are relying on the result of multiplying 2 k large prime numbers called N where n divides N. The GRSA-AA claimed that the brute force is necessary to break the cryptosystem even if the integer n was factored. Nevertheless, this paper aims to show that this scheme is insecure once n is factored. The mathematical proof is presented to show that it is easy to generate an alternative value to the private key D without brute-forcing, yet successfully break the system. © Published under licence by IOP Publishing Ltd.
publisher Institute of Physics Publishing
issn 17426588
language English
format Conference paper
accesstype All Open Access; Gold Open Access
record_format scopus
collection Scopus
_version_ 1809677902193623040