Table 2.1: Factorization time by NFS
Key Size
(bits)
Total Time
(Ops)
Factor Base
Sieve Memory
Matrix
Memory
428
5.5 x 10
17
600K
24 M
128 M
465
2.5 x 10
18
1.2M 64MB 825
M
512
1.7 x 10
19
3M 128MB 2
G
768
1.1 x 10
23
240M 10GB 160G
1024
1.3 x 10
26
7.5G 256GB 10T
2.8.2 Finding p and q instead
An alternative to finding the factors of N is to guess p, q and check whether they generate
the publicly known modulus N. This strategy is not very popular.
2.8.3 Guess attacks and Brute Force Attack
An adversary may be able to find out the keys without the use of factorization techniques.
One way for that is a guess attack. A single message can sometimes be decrypted this
way. The adversary guesses what the encrypted message may be based on information he
has. He uses the public key on the guesses message to see if yields the same ciphertext. It
becomes still easier if the sender uses the same key for multiple messages. The adversary
can use these multiple messages to arrive at the private key easily.
Brute force attacks are the attacks where the adversary tries every possible input to
recreate the encrypted message. In other words, if C = M
e
mod N, since C and e are
known, the adversary tries every possible value of M with the known e to recreate C.
Once he is able to get the same ciphertext C, he has discovered the plaintext M. This type
of attack is impractical and may not yield correct results if the sender compresses the
message M or pads it before encrypting.
17
Do'stlaringiz bilan baham: |