[JoGu]

Cryptology

III.2 Cryptanalysis of RSA

a7Hzq .#5r<
kÜ\as TâÆK$
ûj(Ö2 ñw%h:
Úk{4R f~`z8
¤˜Æ+Ô „&¢Dø

Contents

  1. The prime number theorem [PDF]
  2. Computing the key and factoring [PDF]
  3. The probability of flops [PDF]
  4. Factoring algorithms (overview) [PDF]
  5. Iteration attack [PDF]
  6. Breaking single ciphertexts [PDF]
  7. Re-use of a module [PDF]
  8. Small exponents [PDF]
  9. The signature trap [PDF]
  10. More attacks (overview) [PDF]
The complete chapter as PDF file


Overview

»Cryptanalysis of RSA« doesn't break the cipher—except in a few exceptional situations—but traces out the framework for applying it in a secure way according to our best judgment. In particular it helps avoiding some traps.

We want answers to the questions:

A summary of the results is

The RSA cipher is secure according to the present state of the science. However the choice of the parameters must avoid some traps. In particular the key length should be at least 2048 bits for short-term security, 4096 bits for medium-term security.

There is a good overview in:


Author: Klaus Pommerening, 2000-May-21; last change: 2021-Feb-21