Paper 2003/045

An algorithm to obtain an RSA modulus with a large private key

L. Hernández Encinas, J. Muñoz Masqué, and A. Queiruga Dios

Abstract

Sufficient conditions are obtained on the prime factors of an RSA modulus in order to avoid Wiener and Boneh-Durfee attacks. The public exponent can be chosen arbitrarily.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Boneh-Durfee attackDecryption exponentPublic key cryptographyRSA cryptosystemWiener attack
Contact author(s)
luis @ iec csic es
History
2003-03-13: revised
2003-03-13: received
See all versions
Short URL
https://ia.cr/2003/045
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2003/045,
      author = {L.  Hernández Encinas and J.  Muñoz Masqué and A.  Queiruga Dios},
      title = {An algorithm to obtain an RSA modulus with a large private key},
      howpublished = {Cryptology ePrint Archive, Paper 2003/045},
      year = {2003},
      note = {\url{https://eprint.iacr.org/2003/045}},
      url = {https://eprint.iacr.org/2003/045}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.