Study on Factorization of n = p * q
碩士 === 國立交通大學 === 資訊科學與工程研究所 === 95 === The RSA Cryptosystem is one of the most used public-key cryptosystems. The security it rests on the fact that it is computationally infeasible to factor a large integer into its component primes. This fact is referred to as the RSA assumption. It is believed t...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Online Access: | http://ndltd.ncl.edu.tw/handle/48362942165229681606 |
id |
ndltd-TW-095NCTU5394009 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NCTU53940092016-05-27T04:18:38Z http://ndltd.ncl.edu.tw/handle/48362942165229681606 Study on Factorization of n = p * q n=p*q的因數分解之研究 Yu-Hao Chang 張煜�c 碩士 國立交通大學 資訊科學與工程研究所 95 The RSA Cryptosystem is one of the most used public-key cryptosystems. The security it rests on the fact that it is computationally infeasible to factor a large integer into its component primes. This fact is referred to as the RSA assumption. It is believed that there is no deterministic Turing machines (DTM) that can break the RSA assumption in polynomial time. If a polynomial-time algorithm is found, the RSA Cryptosystem would be insecure. Owing to this, many scientists have devoted themselves to researching efficient factoring algorithms. So far, the quadratic sieve factoring algorithm (abbreviated to QS) is the fastest known general-purpose method for factoring numbers having less than about 110 digits. Restricted by time and computer hardware, we focus on one of the variants of the QS, called the multiple polynomial quadratic sieve (MPQS). To ensure the strength of the RSA assumption, we propose a scheme to enhance the sieving procedure of the MPQS. The experimental results are contributive to the analyses of the strength of the RSA assumption against the modern factoring technology and should be taken into consideration on future cryptographic implementations based on the RSA cryptosystem. Yi-Shiung Yeh 葉義雄 學位論文 ; thesis 41 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊科學與工程研究所 === 95 === The RSA Cryptosystem is one of the most used public-key cryptosystems. The security it rests on the fact that it is computationally infeasible to factor a large integer into its component primes. This fact is referred to as the RSA assumption. It is believed that there is no deterministic Turing machines (DTM) that can break the RSA assumption in polynomial time. If a polynomial-time algorithm is found, the RSA Cryptosystem would be insecure. Owing to this, many scientists have devoted themselves to researching efficient factoring algorithms. So far, the quadratic sieve factoring algorithm (abbreviated to QS) is the fastest known general-purpose method for factoring numbers having less than about 110 digits. Restricted by time and computer hardware, we focus on one of the variants of the QS, called the multiple polynomial quadratic sieve (MPQS). To ensure the strength of the RSA assumption, we propose a scheme to enhance the sieving procedure of the MPQS. The experimental results are contributive to the analyses of the strength of the RSA assumption against the modern factoring technology and should be taken into consideration on future cryptographic implementations based on the RSA cryptosystem.
|
author2 |
Yi-Shiung Yeh |
author_facet |
Yi-Shiung Yeh Yu-Hao Chang 張煜�c |
author |
Yu-Hao Chang 張煜�c |
spellingShingle |
Yu-Hao Chang 張煜�c Study on Factorization of n = p * q |
author_sort |
Yu-Hao Chang |
title |
Study on Factorization of n = p * q |
title_short |
Study on Factorization of n = p * q |
title_full |
Study on Factorization of n = p * q |
title_fullStr |
Study on Factorization of n = p * q |
title_full_unstemmed |
Study on Factorization of n = p * q |
title_sort |
study on factorization of n = p * q |
url |
http://ndltd.ncl.edu.tw/handle/48362942165229681606 |
work_keys_str_mv |
AT yuhaochang studyonfactorizationofnpq AT zhāngyùc studyonfactorizationofnpq AT yuhaochang npqdeyīnshùfēnjiězhīyánjiū AT zhāngyùc npqdeyīnshùfēnjiězhīyánjiū |
_version_ |
1718283825937645568 |