Skip to main content

Questions tagged [rsa]

An asymmetric (e.g. public-key) cryptosystem, based on modular exponentiation with big exponents and modulus. RSA can be used both for signature and encryption with proper paddings.

2 votes
1 answer
161 views

Factor multi-prime RSA

I have a multi prime 2043 bit modulus with 8 prime factors, each 256 bit. ...
wizzbud's user avatar
  • 21
2 votes
1 answer
98 views

Modulus blinding in RSA?

To prevent some side-channel attacks in RSA, I've seen people use multiplicative blinding $$ a^d\bmod N=(r^{-1})^d(ra)^d\bmod N $$ or additive exponent blinding $$ a^d=a^{d+r\phi(N)}\bmod N. $$ ...
yoyo's user avatar
  • 522
1 vote
1 answer
106 views

RSA variant with cyclotomic polynomial

Please I want to ask if some one have any idea about a cryptosystem RSA variant when we replace $\phi(N)$ in the key equation $ed-k\phi(N)=1$ by a product of to Cyclotomic polynomial like $\Phi_8(p)*\...
MOSTAFA CHAKER's user avatar
0 votes
1 answer
135 views

How long would it take a 1GW GPU cluster to brute force RSA1024

Similar to How long does it take to crack RSA 1024 with a PC? I'm wondering if someone can estimate how long it would take a large ~1GW gpu cluster (such as being built by XAI/Anthropic/Meta) to brute ...
davik's user avatar
  • 101
3 votes
2 answers
179 views

What happens in RSA when $e=23$ is a factor of $p-1$?

I want to understand how to relate that $e = 23$ $e$ divides $(p-1)$ I have the value $(p+q)\gg 100$ (where $\gg$ stands for right-shift) I have the value $g = d^{-1}\bmod \varphi$ where $d$ is a ...
STUD's user avatar
  • 63
1 vote
2 answers
216 views

RSA: Construct PKCS #1 padding for given data string and cipher prefix

Let $n$, $e$ be an RSA public key. Let $k$ be the byte length of $n$. Hence, we have $2^{8(k-1)} \le n \lt 2^{8k}$. A data string $DS$, consisting of $|DS|$ bytes, is encrypted as follows. First, a ...
Peter Mudrievskij's user avatar
6 votes
1 answer
1k views

Factoring RSA numbers on a laptop

According to https://en.wikipedia.org/wiki/RSA_Factoring_Challenge $862$ bit $RSA$ numbers have not been factored. With the current state of the art in sieve techniques is it possible to factor $460$ ...
Turbo's user avatar
  • 1,117
1 vote
0 answers
118 views

Fermat's difference of squares: Expanding & factoring the subsequent differences to infinity [closed]

If I factor all subsequent differences of Fermat's difference of squares, I conclude that $(a^2-b^2) = 0$ as follows below. Did I do something incorrect in my expansion, or is my attempt at proof ...
steveK's user avatar
  • 91
3 votes
2 answers
321 views

In the RSA(SSA)-PSS signature scheme, why does the message need to be hashed twice and why is masking the "salt" needed?

I'm trying to understand the design of RSA(SSA)-PSS, as shown here: https://upload.wikimedia.org/wikipedia/commons/5/53/RSASSA-PSS_PSS-encode.png Two things I don't really understand: Why does the ...
Jörg Ackermann's user avatar
1 vote
1 answer
78 views

Obliviously sampling RSA moduli

Is it possible to efficently sample an RSA modulus (a product of two uniformly random λ-bit primes) obliviously? Obliviously here means that the random coins used for the sampling should not reveal ...
Roman Langrehr's user avatar
1 vote
0 answers
66 views

Can this identity between integer products and digital roots aid in partial RSA key recovery?

I've recently published a paper introducing a new algebraic identity that links integer products and their digital roots in a structured way. The identity is: $ \frac{pq - r_p r_q}{9} = 9 \cdot \frac{...
AhmedSaied's user avatar
1 vote
0 answers
100 views

Can products of primes generated by this random walk algorithm be factored efficiently? [closed]

Algorithm Description: A prime-generation algorithm constructs random primes by appending digits such that: Start with a small initial digit (e.g., 1). At each step, append a new digit d to the ...
Lisbeth's user avatar
  • 577
0 votes
0 answers
20 views

k- out of N oblivious transfer based on "blindable" one-more assumptions?

I was thinking about one paper I was writing and suddenly it occurred to me that I can build k-out of n oblivious transfer using any of the blindable one-more type problems (One more RSA-inversion, ...
Manish Adhikari's user avatar
1 vote
2 answers
177 views

What are the implications of insufficient entropy when signing a payload using a SHA-RSA256 private key?

I have an embedded environment without access to entropy, trying to sign a message using RSA-SHA256 (JWT). Would it be insecure to ignore the entropy requirements forcefully, and sign without any &...
doggopwn's user avatar
2 votes
3 answers
571 views

Balanced Primes for the RSA modulus

I am currently working on a Multipower RSA given by Takagi. I am following the book 'Cryptanalysis of RSA and Its Variants' by Jason Hinek. It gives the definition of balanced primes for standard RSA ...
Abubakar's user avatar

15 30 50 per page
1
2 3 4 5
191