{"title":"Multi-Channel Interpolation Method for RSA","authors":"Xiu-yi Tang, Qi-long Jia, Meng Xu, Meng Jiang","doi":"10.1109/IEEC.2010.5533290","DOIUrl":null,"url":null,"abstract":"This article introduces the RSA algorithm and the principle of its encryption decipher. We attack this algorithm in simulation by the feasible attack methods after analyzing the algorithm intensity. It is confirmed that the algorithm's real intensity cannot achieve its theoretical intensity judging from the mathematical theory and the program simulation. Hence, we develop the optimization proposal aiming at these shortcomings.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEC.2010.5533290","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This article introduces the RSA algorithm and the principle of its encryption decipher. We attack this algorithm in simulation by the feasible attack methods after analyzing the algorithm intensity. It is confirmed that the algorithm's real intensity cannot achieve its theoretical intensity judging from the mathematical theory and the program simulation. Hence, we develop the optimization proposal aiming at these shortcomings.