{"title":"多素数RSA算法优化的比较研究","authors":"Ziyuan Ma","doi":"10.1109/CONF-SPML54095.2021.00039","DOIUrl":null,"url":null,"abstract":"With the continuous development of computer technology, the amount of data shared on the Internet has increased significantly. Increasing demand for big data continues to grow, facing many security challenges. In today’s information era, data on the Internet is vulnerable to various attacks, and everyone wants to protect their privacy. Therefore, maintaining the security of user-class data has become the current research hotspot. This article integrates four methods, the traditional two-prime RSA, two-prime mixed CRT, and three-prime CRT-RSA and traditional tetraprime and optimized quatertraprime methods operate on the same message summaries to record their respective time-consuming behaviors. optimization is of great significance.","PeriodicalId":415094,"journal":{"name":"2021 International Conference on Signal Processing and Machine Learning (CONF-SPML)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparative Study of the Optimization of the Multi-prime RSA Algorithm\",\"authors\":\"Ziyuan Ma\",\"doi\":\"10.1109/CONF-SPML54095.2021.00039\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the continuous development of computer technology, the amount of data shared on the Internet has increased significantly. Increasing demand for big data continues to grow, facing many security challenges. In today’s information era, data on the Internet is vulnerable to various attacks, and everyone wants to protect their privacy. Therefore, maintaining the security of user-class data has become the current research hotspot. This article integrates four methods, the traditional two-prime RSA, two-prime mixed CRT, and three-prime CRT-RSA and traditional tetraprime and optimized quatertraprime methods operate on the same message summaries to record their respective time-consuming behaviors. optimization is of great significance.\",\"PeriodicalId\":415094,\"journal\":{\"name\":\"2021 International Conference on Signal Processing and Machine Learning (CONF-SPML)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Signal Processing and Machine Learning (CONF-SPML)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONF-SPML54095.2021.00039\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Signal Processing and Machine Learning (CONF-SPML)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONF-SPML54095.2021.00039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative Study of the Optimization of the Multi-prime RSA Algorithm
With the continuous development of computer technology, the amount of data shared on the Internet has increased significantly. Increasing demand for big data continues to grow, facing many security challenges. In today’s information era, data on the Internet is vulnerable to various attacks, and everyone wants to protect their privacy. Therefore, maintaining the security of user-class data has become the current research hotspot. This article integrates four methods, the traditional two-prime RSA, two-prime mixed CRT, and three-prime CRT-RSA and traditional tetraprime and optimized quatertraprime methods operate on the same message summaries to record their respective time-consuming behaviors. optimization is of great significance.