𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A Method for Rapid RSA Key Generation

✍ Scribed by Yasuko Gotoh; Kazuo Takaragi; Ryoichi Sasaki


Book ID
104591332
Publisher
John Wiley and Sons
Year
1990
Tongue
English
Weight
653 KB
Volume
21
Category
Article
ISSN
0882-1666

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract

The RSA public key cryptosystem is one of the cryptosystems which can be applied not only to the security protection but also to the verifications of other users and messages. It is one of the most important techniques in ensuring the security of information. To construct a secure RSA public key cryptosystem, the key must be generated using primes which are robust against a β€œ(p + 1) factorizing attack.” For this purpose, Gordon proposed a method of generating the key by sieving using known primes less than 8 bit and by employing the higher‐order exponential calculation. This paper is an extension of Gordon's approach. The range of known primes is defined optimally through an evaluation for the sieving primes less than 32 bit. The exponential calculation is simplified. The method is implemented on a program. Numerical experiment is made on a 32‐bit workstation, and the practical usefulness of the method is verified.


πŸ“œ SIMILAR VOLUMES


A simple approach for generating RSA key
✍ Chin-Chen Chang; Shin-Jia Hwang πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 190 KB

We propose a modification of Derome's method ( 1993) to compute the RSA secret data d = e-l mod (P -1) (Q -1) by utilizing the modular arithmetic operations, when e is not prime. Here P and Q are two large prime numbers in RSA cryptosystem and e is the public data. @ 1997 Elsevier Science B.V.

A Method for Measuring Entropy of Symmet
✍ E.P. Dawson; H.M. Gustafson πŸ“‚ Article πŸ“… 1998 πŸ› Elsevier Science 🌐 English βš– 670 KB

This method can be applied in the case where the algorithm used to generate the key is unknown, only the actual keys are required.