Font Size: a A A

Research And Analysis RSA Algorithm

Posted on:2014-04-18Degree:MasterType:Thesis
Country:ChinaCandidate:Z H DingFull Text:PDF
GTID:2268330401473252Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The modern society has entered the information age, network technology with the development of globalization has completely changed the way people transfer information。Internet technology has entered into every aspect in people’s lives, and become an important means of communication。 These technologies brings great convenience to our life and work at the same time, also brought us new challenges, requires the higher security of the network become the focus of our attention. Therefore, how to protect the transmission of network information security has become an important topic of major research institutions.This page research object is the RSA algorithm. RSA algorithm is a public key cryptosystem, It is currently one of the most widely used encryption system。RSA algorithm is based on the decomposition problem of large prime numbers, in order to prevent all kinds of attacks, the mold long growing RSA algorithm operations are large integer modular exponentiation and modular multiplication, so its running speed RSA’s slower to become a significant feature. In addition, with the increase of attacks, RSA security has also been a big impact。The RSA cryptosystem is very safe, in theory, but in practical applications, specific RSA cryptosystem is different, every design has its own specific requirements, or requirements for speed, or is asecurity requirements. The password attacker can target specific RSA system specific attack methods to decipher. And many attack methods are very effective under certain conditions. Therefore, in order to guard against the threat of RSA cryptosystem security improved algorithm so that it has been some improvement in the security。The main research work are as follows:(1) The first part introduces some of the research status of the RSA cryptosystem and abroad, to understand at home and abroad in the field of cryptography research some state and up-to-date results, and introduce some of the basic theory of the RSA cryptosystem, the presentation of the basic theory first introduced under the RSA cryptosystemthe algorithm used to basic knowledge of mathematics, next a more complete description of the RSA cryptosystem, its choice of parameters, the generation of large prime numbers are described. Depth analysis of the entire process of the RSA cryptosystem(2)The second part of the article is a detailed description of the defects of the RSA cryptosystem RSA cryptosystem own design theory reasons, running speed is known as a relatively large defects busy, very over-the researchers are in this respectdone a lot of work, but also yielded some results. In this section we RSA security detailed analysis using two sophisticated attack methods to attack, found that traditional RSA security can not be very good resistance to both attacks.(3) Third part against the front of the the RSA attack methods can not resist the calculation φ(n) and common-mode attacks, two attack methods for calculating φ(n) and common mode of attack methods improvement program, a combination of twothe advantages of the method of attack, the third modification of the RSA scheme and the feasibility and safety analysis, and finally concluded that the new program achieved the expected results security has been greatly improved。...
Keywords/Search Tags:RSA, Modular exponentiation multiplication, Security, improving realization
PDF Full Text Request
Related items