Abstract
A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has to obtain the plaintext versions of some carefully chosen ciphertexts only once, and can then proceed to decrypt further ciphertexts without further recourse to the authorized user’s decrypting facility. This attack is considerably more efficient than the best algorithms that are known for factoring the public modulus. The same idea can also be used to develop an attack on the three-pass system of transmitting information using exponentiation in a finite field.
Original language | English (US) |
---|---|
Title of host publication | Advances in Cryptology — CRYPTO 1985 - Proceedings |
Editors | Hugh C. Williams |
Publisher | Springer Verlag |
Pages | 516-522 |
Number of pages | 7 |
ISBN (Print) | 9783540164630 |
DOIs | |
State | Published - 1986 |
Externally published | Yes |
Event | 5th Annual International Cryptology Conference, CRYPTO 1985 - Santa Barbara, United States Duration: Aug 18 1985 → Aug 22 1985 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 218 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 5th Annual International Cryptology Conference, CRYPTO 1985 |
---|---|
Country/Territory | United States |
City | Santa Barbara |
Period | 8/18/85 → 8/22/85 |
Bibliographical note
Publisher Copyright:© 1986, Springer-Verlag Berlin Heidelberg.