...
首页> 外文期刊>Research journal of science and technolo >Bi-Quadratic Analysis of Pollard's Rho Method of Integer Factorization in Context of Cryptography
【24h】

Bi-Quadratic Analysis of Pollard's Rho Method of Integer Factorization in Context of Cryptography

机译:密码学背景下Pollard Rho整数分解的双阶分析

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Cryptography is an important building block of e-commerce systems. In particular, public key cryptography can be used for ensuring the confidentiality, authenticity, and integrity of information in an organization. To protect the sensitive information in an organization, encryption can be applied to conceal sensitive data so that the encrypted data is completely meaningless except to the authorized individuals with the correct decryption key. To preserve the authenticity and integrity of data, digital signature can be performed on the data such that other people can neither impersonate the correct signer nor modify the signed data without being detected. RSA is one of the most popular public key cryptographic algorithms in used in e-commerce. Suppose Alice wants to send an encrypted message to Bob. Let the public key of Bob be and the private key of Bob be where n is the product of two prime numbers p and q (with ed=1 (mod (p-1)(q-1))- In this scenario, is accessible to anyone (e.g. Alice) who wants to send encrypted messages to Bob while d is kept secretly by Bob.To encrypt a message M for Bob, Alice has to compute M'=M~e (mod n). Bob can decrypt M' by computing M"=(M~e)~d=M (mod n). No one except Bob can decrypt M' since d is only known to Bob. To calculate d from e, it is required to factor n to get p and q. With p and q, it is possible to calculate (p-1)(q-1). By reversing the key generation procedure, d can be calculated by computing e~(-1)(mod (p-1)(q-1))- The security of RSA depends on the difficulty in factoring n into p and q if n is sufficiently large. Therefore, the size of n should be chosen such that the time and cost for performing the factorization exceeds the value of the encrypted information. If we are able to factor any number in to product of two primes then this show that the system is not secure. And if we are not able to factor the number in product of two prime then this show that system is secure. Our's objective to show that how to make any type of system insecure by Pollard's Rho algorithm with respect to various type of algorithms & analysis of Pollards Rho algorithm.
机译:密码学是电子商务系统的重要组成部分。特别是,公共密钥密码术可用于确保组织中信息的机密性,真实性和完整性。为了保护组织中的敏感信息,可以使用加密来隐藏敏感数据,以使加密数据完全无意义,除非具有正确解密密钥的授权人员可以使用。为了保持数据的真实性和完整性,可以对数据执行数字签名,以使其他人既无法假冒正确的签名者,也无法修改签名的数据而不被检测到。 RSA是电子商务中最流行的公钥加密算法之一。假设爱丽丝想向鲍勃发送加密的消息。设Bob的公钥为,而Bob的私钥为,其中n是两个质数p和q的乘积(ed = 1(mod(p-1)(q -1))-在这种情况下,任何要发送加密消息给Bob的人(例如Alice)都可以访问,而d被Bob秘密保存。要为Bob加密消息M,Alice必须计算M'= M〜e(mod n)。Bob可以通过计算M“ =(M〜e)〜d = M(mod n)来解密M'。除了Bob之外,没有人可以解密M',因为d只有Bob知道要从e计算d,需要将n分解为p和q,使用p和q可以计算出(p-1)(q-1)。通过计算e〜(-1)(mod(p-1)(q-1))来计算-RSA的安全性取决于n足够大时将n分解为p和q的难度,因此n的大小应该选择使得执行分解的时间和成本超过加密信息的值。那么两个素数表明系统不安全。而且,如果我们不能将两个素数的乘积中的数字考虑在内,则表明该系统是安全的。我们的目的是针对各种类型的算法以及Pollards Rho算法的分析,展示如何通过Pollard的Rho算法使任何类型的系统不安全。

著录项

  • 来源
    《Research journal of science and technolo》 |2013年第1期|41-45|共5页
  • 作者

    Satish Kumar; P.L Sharma;

  • 作者单位

    Department of Mathematics Govt P.G. College Kullu Distt. Kullu (H. P) Pin -175101;

    Department of Mathematics & Statistics, H.P. University, Shimla -171005;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号