Abstract by anuja a sonalker on Asymmetric Key Distribution


Table 2.1: Factorization time by NFS


Download 217.42 Kb.
Pdf ko'rish
bet14/43
Sana19.04.2023
Hajmi217.42 Kb.
#1365410
1   ...   10   11   12   13   14   15   16   17   ...   43
Bog'liq
etd

Table 2.1: Factorization time by NFS 
Key Size 
(bits) 
Total Time 
(Ops) 
Factor Base 
Sieve Memory 
Matrix 
Memory 
428 
5.5 x 10
17
600K 
24 M 
128 M 
465 
2.5 x 10
18
1.2M 64MB 825 

512 
1.7 x 10
19
3M 128MB 2 

768 
1.1 x 10
23
240M 10GB 160G 
1024 
1.3 x 10
26
7.5G 256GB 10T 
 
 
2.8.2 Finding p and q instead 
An alternative to finding the factors of N is to guess p, q and check whether they generate 
the publicly known modulus N. This strategy is not very popular.
2.8.3 Guess attacks and Brute Force Attack 
An adversary may be able to find out the keys without the use of factorization techniques. 
One way for that is a guess attack. A single message can sometimes be decrypted this 
way. The adversary guesses what the encrypted message may be based on information he 
has. He uses the public key on the guesses message to see if yields the same ciphertext. It 
becomes still easier if the sender uses the same key for multiple messages. The adversary 
can use these multiple messages to arrive at the private key easily. 
Brute force attacks are the attacks where the adversary tries every possible input to 
recreate the encrypted message. In other words, if C = M
e
mod N, since C and e are 
known, the adversary tries every possible value of M with the known e to recreate C. 
Once he is able to get the same ciphertext C, he has discovered the plaintext M. This type 
of attack is impractical and may not yield correct results if the sender compresses the 
message M or pads it before encrypting. 


17 

Download 217.42 Kb.

Do'stlaringiz bilan baham:
1   ...   10   11   12   13   14   15   16   17   ...   43




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling