Smooth Operator – The Use of Smooth Integers in Fast Generation of RSA Keys

12/24/2019
by   Vassil Dimitrov, et al.
0

Primality generation is the cornerstone of several essential cryptographic system, most notably, the RSA cryptosystem. The problem has been a subject of deep investigations by the computational number theorists, but there is still room for improvement. Typically, the algorithms used have two parts - trial divisions aimed at eliminating numbers with small prime factors and primality tests based on an easy-to-compute statement that is valid for primes and invalid for composites. In this paper we will showcase a technique that will eliminate the first phase of the primality testing algorithms. It is particularly suitable for a decentralized RSA key generation. The computational simulations show reduction of the primality generation time for about 30 the case of 1024-bit RSA private keys. We are also proposing one new one-way function that can be used either as a hash function or as cryptographic puzzle for mining purposes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/15/2020

Removable Weak Keys for Discrete Logarithm Based Cryptography

We describe a novel type of weak cryptographic private key that can exis...
research
09/14/2020

Biased RSA private keys: Origin attribution of GCD-factorable keys

In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported ...
research
10/13/2022

PUPoW: A framework for designing blockchains with practically-useful-proof-of-work vanitycoin

Bitcoin is the first of its kind, a truly decentralized and anonymous cr...
research
09/17/2019

Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography

An ideal signature material and method, which can be used to prove the a...
research
05/29/2020

Wallet Attestations for Virtual Asset Service Providers and Crypto-Assets Insurance

The emerging virtual asset service providers (VASP) industry currently f...
research
10/26/2007

The entropy of keys derived from laser speckle

Laser speckle has been proposed in a number of papers as a high-entropy ...
research
05/06/2023

On the usefulness of linear types for correct nonce use enforcement during compile time

Cryptographic algorithms and protocols often need unique random numbers ...

Please sign up or login with your details

Forgot password? Click here to reset