RSA 암호방식의 안전성에 관한 연구

A Study on the Notion of Security for Publsc-Key Encryption Schemes

  • 발행 : 1998.12.01

초록

본 고에서는 큰 수의 인수분해가 어렵다는 사실에 기반한 암호방식인 RSA암호시스템의 안전성에 영향을 미치는 여러 요소에 대하여 고찰하였다. 먼저 RSA시스템에 대하여 간단하게 살펴보고, 다음으로 모듈러 n의 인수분해를 통한 공격 방식을 살펴본다. 그리고 마지막으로 RSA시스템에 대한 공격 방식을 homomorphic공격과 다항식 공격으로 나누어 살펴본다.

키워드

참고문헌

  1. Information and Communications Security, Lecture Notes in Computer Science v.1334 A new and optimal chosenmessage attack on RSA-type cryptosystems D. Bleichenbacher;M. Joye;J.-J. Quisquater;Y. Han(ed.);T. Okamoto(ed.);S. Qing(ed.)
  2. Advances in Cryptology - Eurocrypt '96 , Lecture Notes in Computer Science v.1070 Finding a small root of a bivariate integer equation: factoring with high bits known D. Coppersmith;U. Maurer(ed.)
  3. Eurocypt'96 Lecture Notes in Computer Science v.1070 Finding a small root of a univariate modular equation. Advances in Cryptology D. Coppersmith;U. Maurer(ed.)
  4. Eurocypt'96 Lecture Notes in Computer Science v.1070 Low exponent RSA with related messages D. Coppersmith;M. Franklin;J. Patarin;M. Reiter;U. Maurer(ed.)
  5. Tech. Report TR-CS-82-2. Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem G. Davida
  6. Crypto '93 On the Factorization of RSA-120 T. Denny;B. Dodson;A.K. Lenstra;M.S. Manasse
  7. IEEE Transaction on Information Theory IT- v.26 no.6 New diractions in cryptography W. Diffie;M. E. Hellman
  8. Euro Crypt '93 Factoring Integers Using SIMD Sieves Brandon Dixon;Arjen K. Lenstra
  9. Advances in Cryptology - Eurocrypt '97, Lecture Notes in Computer Science v.1233 Selective forgery of RSA signatures using redundancy M. Girault;J.-F. Misarsky;W. Fumy(ed))
  10. Advances in Cryptology - Eurocrypt '85, Lecture Notes in Computer Science v.218 On using RSA with low exponent in a public key network, Advance in Cryptology J. Hastad;H. C. Williams(ed.)
  11. Euro Cypt '91 Some Considerations concerning the Selection of RSA Moduli Klaus Huber
  12. Advances in Cryptology - Eurocrypt '85, Lecture Notes in Computer Science v.218 Attacks on some RSA signatures W. de Jonge;D. Chaum;H. C. Williams(ed.)
  13. Advances in Cryptology - Eurocrypt '86, Lecture Notes in Computer Science v.263 Some variations on RSA signatures & their security W. de Jonge;D. Chaum
  14. Tech. Report CG-1996/10 Common modulus attack against Lucas-based sryptosystem M. Joye
  15. Proc. of the 4th ACM Conference on Computer and Communications Security On the importance of securing your bins: The garbage-man-in-the-middle attack M. Joye;T. Matsumoto(ed.)
  16. Tech. Report CG-1997/3 Takagi/Naito's algorithm revisited M. Joye
  17. Graduate Texts in Mathematics v.114 A course in number theory and cryptography(2nd ed.) N. Koblitz
  18. The art of computer programming: volume 2.seminumerical algorithms(2nd ed.) D. E. Knuth
  19. Euro Cypt '90 Factoring with two large primes Arjen K. Lenstra
  20. Euro Cypt '89 Factoring by electronic mail Arjen K. Lenstra;Mark S. Manasse
  21. Handbook of applioed cryptography A. Menezes;P. Oorschot;S. Vanstone
  22. Math.Comp. v.29 A method of factoring and factorization of F7 M. A. Morrison;J. Brillhart
  23. Proc of the 1985 Symposium on Security and Privacy A fast signature scheme based on quadratic inequalities T. Okamoto;A. Shiraishi
  24. BIT v.16 A Monte Carlo Method for Factorization J. M. Pollard
  25. Proceeding of the Cambridge Philosophical Society v.76 Theorems on factorizatin and primality testing J. M. Pollard
  26. Math. Centrum v.154 Analysis and comparison of some integer factoring algorithm, in Computational Method in Computational Methods in Number Theory C. Pomerance;H.W. Lenstra, Jr(ed.);R. Tijdeman(ed.)
  27. Euro Crypt '84. The Quadratic Sieve Factoring Algorithm C. Pomerance
  28. Comunications of the ACM v.21 no.2 A method for obtaining digital signatures and public-key cryptosystems L. Rivest;A. Shamir;L. Adleman
  29. Applied cryptography: protocols, algorithms, and source code in C(2nd ed.) B. Schneier
  30. Math.Comp v.84 The multiple polynomial quadratic sieve R.D. Silverman
  31. Cryptopogia v.1 Prelininary comments on the M.I.T. public-key cryptosystem G. J. Simmons;M. J. Norris
  32. Euro Crypt '89 Cryptanalysis of Short RSA Secret Exponents Michael J. Wiener