ISBN-13: 9781420075182 / Angielski / Twarda / 2009 / 272 str.
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its main variants, including CRT-RSA, multi-prime RSA, and multi-power RSA. Divided into three parts, the book first introduces RSA and reviews the mathematical background needed for the majority of attacks described in the remainder of the text. It then brings together all of the most popular mathematical attacks on RSA and its variants. For each attack presented, the author includes a mathematical proof if possible or a mathematical justification for attacks that rely on assumptions. For the attacks that cannot be proven, he gives experimental evidence to illustrate their practical effectiveness. Focusing on mathematical attacks that exploit the structure of RSA and specific parameter choices, this book provides an up-to-date collection of the most well-known attacks, along with details of the attacks. It facilitates an understanding of the cryptanalysis of public-key cryptosystems, applications of lattice basis reduction, and the security of RSA and its variants.
The first resource to focus on the security variances of RSA, Cryptanalysis of RSA and Its Variants is a comprehensive survey of the best known algebraic attacks on RSA and its main variants, including Rebalanced RSA, Multi-prime RSA, and Multi-factor RSA. The preliminary material introduces RSA and reviews all the mathematical background needed for the remainder of the book. The next two parts collect together all the best known algebraic attacks. For each attack, the author provides a mathematical proof if possible, or a mathematical justification for those that rely on assumptions. For those attacks that cannot be proven, he provides experimental evidence to illustrate their practical effectiveness. This invaluable work will be of interest for researchers and graduate students interested in the cryptanalysis of public-key cryptosystems, RSA in particular, and also for researchers interested in applications of lattice basis reduction (based on Coppersmith's methods). In addition, it is suitable as a reference for the security of RSA and it variants.