On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem
This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA design proposal, the public key n is defined as the multiplication of two large prime numbers, while the values of encryption key...
Published in: | Journal of Physics: Conference Series |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
Institute of Physics Publishing
2019
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076082670&doi=10.1088%2f1742-6596%2f1366%2f1%2f012021&partnerID=40&md5=3c89acfa0ac0869a1631d4a8e4bb155a |
id |
2-s2.0-85076082670 |
---|---|
spelling |
2-s2.0-85076082670 Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N. On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem 2019 Journal of Physics: Conference Series 1366 1 10.1088/1742-6596/1366/1/012021 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076082670&doi=10.1088%2f1742-6596%2f1366%2f1%2f012021&partnerID=40&md5=3c89acfa0ac0869a1631d4a8e4bb155a This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA design proposal, the public key n is defined as the multiplication of two large prime numbers, while the values of encryption key E and decryption key D are relying on the result of multiplying 2 k large prime numbers called N where n divides N. The GRSA-AA claimed that the brute force is necessary to break the cryptosystem even if the integer n was factored. Nevertheless, this paper aims to show that this scheme is insecure once n is factored. The mathematical proof is presented to show that it is easy to generate an alternative value to the private key D without brute-forcing, yet successfully break the system. © Published under licence by IOP Publishing Ltd. Institute of Physics Publishing 17426588 English Conference paper All Open Access; Gold Open Access |
author |
Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N. |
spellingShingle |
Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N. On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem |
author_facet |
Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N. |
author_sort |
Isa M.A.M.; Rahmany N.N.A.; Asbullah M.A.; Sathar M.H.A.; Rasedee A.F.N. |
title |
On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem |
title_short |
On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem |
title_full |
On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem |
title_fullStr |
On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem |
title_full_unstemmed |
On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem |
title_sort |
On the Insecurity of Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem |
publishDate |
2019 |
container_title |
Journal of Physics: Conference Series |
container_volume |
1366 |
container_issue |
1 |
doi_str_mv |
10.1088/1742-6596/1366/1/012021 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076082670&doi=10.1088%2f1742-6596%2f1366%2f1%2f012021&partnerID=40&md5=3c89acfa0ac0869a1631d4a8e4bb155a |
description |
This paper explores the security claims of the Generalized (Rivest-Shamir-Adleman) - Advance and Adaptable Cryptosystem, in short the GRSA-AA cryptosystem. In the GRSA-AA design proposal, the public key n is defined as the multiplication of two large prime numbers, while the values of encryption key E and decryption key D are relying on the result of multiplying 2 k large prime numbers called N where n divides N. The GRSA-AA claimed that the brute force is necessary to break the cryptosystem even if the integer n was factored. Nevertheless, this paper aims to show that this scheme is insecure once n is factored. The mathematical proof is presented to show that it is easy to generate an alternative value to the private key D without brute-forcing, yet successfully break the system. © Published under licence by IOP Publishing Ltd. |
publisher |
Institute of Physics Publishing |
issn |
17426588 |
language |
English |
format |
Conference paper |
accesstype |
All Open Access; Gold Open Access |
record_format |
scopus |
collection |
Scopus |
_version_ |
1809677902193623040 |