Abstract

Currently, the relatively popular public key encryption is RSA. It was officially launched in 1978 and given their initials as a name. Different encryption and decryption keys are used in the RSA public-key cryptosystem. Deriving decryption keys from known encryption keys is computationally difficult. Rsa has emerged in various forms since its development. Since the development of RSA, there have been various forms, which means there are various loopholes. Next, we will summarize several interesting attack methods of rsa. It will involve continued fractions and CRT and so on. Through this paper, one can learn a series of knowledge about rsa. As a classic asymmetric password, the value of rsa's existence is relatively high, and exploring its value is something that every password learner should experience. Through this article, one will learn about the most basic attack methods of rsa.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call