Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/44085
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWang, Xu.-
dc.date.accessioned2011-05-25T06:51:58Z-
dc.date.available2011-05-25T06:51:58Z-
dc.date.copyright2011en_US
dc.date.issued2011-
dc.identifier.urihttp://hdl.handle.net/10356/44085-
dc.description.abstractRSA is one of the most popular public-key cryptographic schemes used worldwide. Although the newest standard is semantically secure, it must still be used with care. Many attacks target improper usage of RSA scheme. Hence, this project aims to develop a software toolkit which implements these attacks. It would help its users to verify the security strength of the RSA schemes they are currently using. Three attacks are implemented in this project: Wiener‟s attack on low private exponents; attack on keys with close prime factors 𝑝 and 𝑞; and attack on keys with common modulus 𝑁. All three attacks exploit the weaknesses in RSA key generation process. After experimental analysis, it is found that the effectiveness of these attacks against supplied RSA keys is relatively low.en_US
dc.format.extent43 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University-
dc.subjectDRNTU::Engineering::Computer science and engineering::Data::Data encryptionen_US
dc.titleTool kits for attacks on RSAen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorLeong Peng Choren_US
dc.contributor.schoolSchool of Computer Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Science)en_US
item.fulltextWith Fulltext-
item.grantfulltextrestricted-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
SCE0100.pdf
  Restricted Access
958.58 kBAdobe PDFView/Open

Page view(s)

235
checked on Oct 23, 2020

Download(s)

12
checked on Oct 23, 2020

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.