Tunable Balancing of RSA

We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanced according to the application requirements. Our method is a generalisation of using small public exponents and small C...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Galbraith, Steven D., Heneghan, Chris, McKee, James F.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 292
container_issue
container_start_page 280
container_title
container_volume
creator Galbraith, Steven D.
Heneghan, Chris
McKee, James F.
description We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanced according to the application requirements. Our method is a generalisation of using small public exponents and small Chinese remainder (CRT) private exponents. Our results are most relevant in the case where the cost of private operations must be optimised. We give methods for which the cost of private operations is the same as the previous fastest methods, but where the public operations are significantly faster. The paper gives an analysis of the security of keys generated by our method, and a new birthday attack on low Hamming-weight private exponents.
doi_str_mv 10.1007/11506157_24
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17011456</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17011456</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-b1fd47908d943b587284fd43e31d8d03affa8664e4b838503ad427595211a63e3</originalsourceid><addsrcrecordid>eNpNkDtPw0AQhI-XhAmpaCjTUFAYdm_3XmUS8ZIiIUGoT-fYFwWMbfmg4N_jyBRMs9LMp9VohLhAuEEAc4uoQKMyXvKBOCPFQKgt46HIUCPmROyOxkBqxYaORQYEMneG6VRMU3qHQYRWWsjE5fq7CUVdzRahDs1m12xnbZy9vM7PxUkMdaqmf3ci3u7v1svHfPX88LScr_JOovvKC4wlGwe2dEyFskZaHhyqCEtbAoUYg9WaKy4sWTUYJUujnJKIQQ_YRFyNf7uQNqGO_b5F8l2_-wz9j0cDiKz0wF2PXBqiZlv1vmjbj-QR_H4X_28X-gWow0vp</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Tunable Balancing of RSA</title><source>Springer Books</source><creator>Galbraith, Steven D. ; Heneghan, Chris ; McKee, James F.</creator><contributor>Boyd, Colin ; González Nieto, Juan Manuel</contributor><creatorcontrib>Galbraith, Steven D. ; Heneghan, Chris ; McKee, James F. ; Boyd, Colin ; González Nieto, Juan Manuel</creatorcontrib><description>We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanced according to the application requirements. Our method is a generalisation of using small public exponents and small Chinese remainder (CRT) private exponents. Our results are most relevant in the case where the cost of private operations must be optimised. We give methods for which the cost of private operations is the same as the previous fastest methods, but where the public operations are significantly faster. The paper gives an analysis of the security of keys generated by our method, and a new birthday attack on low Hamming-weight private exponents.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540265473</identifier><identifier>ISBN: 9783540265474</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540316841</identifier><identifier>EISBN: 9783540316848</identifier><identifier>DOI: 10.1007/11506157_24</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Chinese Remainder Theorem ; Computer science; control theory; systems ; Decryption Time ; Exact sciences and technology ; Linearisation Attack ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Public Exponent ; Software ; Springer LNCS</subject><ispartof>Information Security and Privacy, 2005, p.280-292</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11506157_24$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11506157_24$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4048,4049,27924,38254,41441,42510</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17011456$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Boyd, Colin</contributor><contributor>González Nieto, Juan Manuel</contributor><creatorcontrib>Galbraith, Steven D.</creatorcontrib><creatorcontrib>Heneghan, Chris</creatorcontrib><creatorcontrib>McKee, James F.</creatorcontrib><title>Tunable Balancing of RSA</title><title>Information Security and Privacy</title><description>We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanced according to the application requirements. Our method is a generalisation of using small public exponents and small Chinese remainder (CRT) private exponents. Our results are most relevant in the case where the cost of private operations must be optimised. We give methods for which the cost of private operations is the same as the previous fastest methods, but where the public operations are significantly faster. The paper gives an analysis of the security of keys generated by our method, and a new birthday attack on low Hamming-weight private exponents.</description><subject>Applied sciences</subject><subject>Chinese Remainder Theorem</subject><subject>Computer science; control theory; systems</subject><subject>Decryption Time</subject><subject>Exact sciences and technology</subject><subject>Linearisation Attack</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Public Exponent</subject><subject>Software</subject><subject>Springer LNCS</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540265473</isbn><isbn>9783540265474</isbn><isbn>3540316841</isbn><isbn>9783540316848</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPw0AQhI-XhAmpaCjTUFAYdm_3XmUS8ZIiIUGoT-fYFwWMbfmg4N_jyBRMs9LMp9VohLhAuEEAc4uoQKMyXvKBOCPFQKgt46HIUCPmROyOxkBqxYaORQYEMneG6VRMU3qHQYRWWsjE5fq7CUVdzRahDs1m12xnbZy9vM7PxUkMdaqmf3ci3u7v1svHfPX88LScr_JOovvKC4wlGwe2dEyFskZaHhyqCEtbAoUYg9WaKy4sWTUYJUujnJKIQQ_YRFyNf7uQNqGO_b5F8l2_-wz9j0cDiKz0wF2PXBqiZlv1vmjbj-QR_H4X_28X-gWow0vp</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Galbraith, Steven D.</creator><creator>Heneghan, Chris</creator><creator>McKee, James F.</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Tunable Balancing of RSA</title><author>Galbraith, Steven D. ; Heneghan, Chris ; McKee, James F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-b1fd47908d943b587284fd43e31d8d03affa8664e4b838503ad427595211a63e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Chinese Remainder Theorem</topic><topic>Computer science; control theory; systems</topic><topic>Decryption Time</topic><topic>Exact sciences and technology</topic><topic>Linearisation Attack</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Public Exponent</topic><topic>Software</topic><topic>Springer LNCS</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Galbraith, Steven D.</creatorcontrib><creatorcontrib>Heneghan, Chris</creatorcontrib><creatorcontrib>McKee, James F.</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Galbraith, Steven D.</au><au>Heneghan, Chris</au><au>McKee, James F.</au><au>Boyd, Colin</au><au>González Nieto, Juan Manuel</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Tunable Balancing of RSA</atitle><btitle>Information Security and Privacy</btitle><date>2005</date><risdate>2005</risdate><spage>280</spage><epage>292</epage><pages>280-292</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540265473</isbn><isbn>9783540265474</isbn><eisbn>3540316841</eisbn><eisbn>9783540316848</eisbn><abstract>We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanced according to the application requirements. Our method is a generalisation of using small public exponents and small Chinese remainder (CRT) private exponents. Our results are most relevant in the case where the cost of private operations must be optimised. We give methods for which the cost of private operations is the same as the previous fastest methods, but where the public operations are significantly faster. The paper gives an analysis of the security of keys generated by our method, and a new birthday attack on low Hamming-weight private exponents.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11506157_24</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Information Security and Privacy, 2005, p.280-292
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_17011456
source Springer Books
subjects Applied sciences
Chinese Remainder Theorem
Computer science
control theory
systems
Decryption Time
Exact sciences and technology
Linearisation Attack
Memory and file management (including protection and security)
Memory organisation. Data processing
Public Exponent
Software
Springer LNCS
title Tunable Balancing of RSA
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T05%3A40%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Tunable%20Balancing%20of%20RSA&rft.btitle=Information%20Security%20and%20Privacy&rft.au=Galbraith,%20Steven%20D.&rft.date=2005&rft.spage=280&rft.epage=292&rft.pages=280-292&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540265473&rft.isbn_list=9783540265474&rft_id=info:doi/10.1007/11506157_24&rft_dat=%3Cpascalfrancis_sprin%3E17011456%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540316841&rft.eisbn_list=9783540316848&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true