Questions tagged [rsa]
An asymmetric (e.g. public-key) cryptosystem, based on modular exponentiation with big exponents and modulus. RSA can be used both for signature and encryption with proper paddings.
2,851 questions
2
votes
1
answer
161
views
Factor multi-prime RSA
I have a multi prime 2043 bit modulus with 8 prime factors, each 256 bit.
...
2
votes
1
answer
98
views
Modulus blinding in RSA?
To prevent some side-channel attacks in RSA, I've seen people use multiplicative blinding
$$
a^d\bmod N=(r^{-1})^d(ra)^d\bmod N
$$
or additive exponent blinding
$$
a^d=a^{d+r\phi(N)}\bmod N.
$$
...
1
vote
1
answer
106
views
RSA variant with cyclotomic polynomial
Please I want to ask if some one have any idea about a cryptosystem RSA variant when we replace $\phi(N)$ in the key equation $ed-k\phi(N)=1$ by a product of to Cyclotomic polynomial like $\Phi_8(p)*\...
0
votes
1
answer
135
views
How long would it take a 1GW GPU cluster to brute force RSA1024
Similar to How long does it take to crack RSA 1024 with a PC?
I'm wondering if someone can estimate how long it would take a large ~1GW gpu cluster (such as being built by XAI/Anthropic/Meta) to brute ...
3
votes
2
answers
179
views
What happens in RSA when $e=23$ is a factor of $p-1$?
I want to understand how to relate that
$e = 23$
$e$ divides $(p-1)$
I have the value $(p+q)\gg 100$ (where $\gg$ stands for right-shift)
I have the value $g = d^{-1}\bmod \varphi$ where $d$ is a ...
1
vote
2
answers
216
views
RSA: Construct PKCS #1 padding for given data string and cipher prefix
Let $n$, $e$ be an RSA public key. Let $k$ be the byte length of $n$. Hence, we have $2^{8(k-1)} \le n \lt 2^{8k}$.
A data string $DS$, consisting of $|DS|$ bytes, is encrypted as follows. First, a ...
6
votes
1
answer
1k
views
Factoring RSA numbers on a laptop
According to https://en.wikipedia.org/wiki/RSA_Factoring_Challenge $862$ bit $RSA$ numbers have not been factored.
With the current state of the art in sieve techniques is it possible to factor $460$ ...
1
vote
0
answers
118
views
Fermat's difference of squares: Expanding & factoring the subsequent differences to infinity [closed]
If I factor all subsequent differences of Fermat's difference of squares, I conclude that $(a^2-b^2) = 0$ as follows below. Did I do something incorrect in my expansion, or is my attempt at proof ...
3
votes
2
answers
321
views
In the RSA(SSA)-PSS signature scheme, why does the message need to be hashed twice and why is masking the "salt" needed?
I'm trying to understand the design of RSA(SSA)-PSS, as shown here:
https://upload.wikimedia.org/wikipedia/commons/5/53/RSASSA-PSS_PSS-encode.png
Two things I don't really understand:
Why does the ...
1
vote
1
answer
78
views
Obliviously sampling RSA moduli
Is it possible to efficently sample an RSA modulus (a product of two uniformly random λ-bit primes) obliviously?
Obliviously here means that the random coins used for the sampling should not reveal ...
1
vote
0
answers
66
views
Can this identity between integer products and digital roots aid in partial RSA key recovery?
I've recently published a paper introducing a new algebraic identity that links integer products and their digital roots in a structured way.
The identity is:
$
\frac{pq - r_p r_q}{9} = 9 \cdot \frac{...
1
vote
0
answers
100
views
Can products of primes generated by this random walk algorithm be factored efficiently? [closed]
Algorithm Description:
A prime-generation algorithm constructs random primes by appending digits such that:
Start with a small initial digit (e.g., 1).
At each step, append a new digit d to the ...
0
votes
0
answers
20
views
k- out of N oblivious transfer based on "blindable" one-more assumptions?
I was thinking about one paper I was writing and suddenly it occurred to me that I can build k-out of n oblivious transfer using any of the blindable one-more type problems (One more RSA-inversion, ...
1
vote
2
answers
177
views
What are the implications of insufficient entropy when signing a payload using a SHA-RSA256 private key?
I have an embedded environment without access to entropy, trying to sign a message using RSA-SHA256 (JWT).
Would it be insecure to ignore the entropy requirements forcefully, and sign without any &...
2
votes
3
answers
571
views
Balanced Primes for the RSA modulus
I am currently working on a Multipower RSA given by Takagi. I am following the book 'Cryptanalysis of RSA and Its Variants' by Jason Hinek. It gives the definition of balanced primes for standard RSA ...