Analyzing the Research and Application of the RSA Cryptosystem in the Context of Digital Signatures
DOI:
https://doi.org/10.62051/j2p6g984Keywords:
Public Key Cryptosystem; RSA Encryption; Digital Signature.Abstract
The article commences by laying the foundational knowledge of public key cryptographic systems, with a focus on RSA encryption and digital signature technology. It then utilizes RSA encryption as a paradigm to elucidate the application of this encryption in digital signature schemes, offering an algorithmic perspective. A critical link is established between the security of digital signatures and the robustness of RSA public key cryptographic systems. Subsequently, the article presents a concise overview of the potential threats facing RSA encryption and proposes pertinent strategies to mitigate these security challenges. It culminates in a synthesis of three distinct approaches, encompassing both algorithmic and hardware aspects, to augment the efficiency of modular exponentiation – a key operation in RSA encryption. Since the inception of the RSA public key cryptosystem, it has been subject to continuous refinement, standardization, and practical deployment. Enhancing the computational efficiency and security of RSA encryption remains a pivotal area of research and discussion within the cryptographic community. Furthermore, with the progressive advancements in quantum theory, traditional public key systems, including RSA and elliptic curve cryptography, confront emerging security vulnerabilities. Thus, the pursuit of post-quantum cryptography, capable of withstanding quantum attacks, represents a frontier scientific endeavor in the field of cryptography.
Downloads
References
Zheng, D., Zhao, Q., & Zhang, Y. (2013). Cryptography Review. Journal of Xi'an University of Posts and Telecommunications, 18(6), 1-10.
Liu, C., & Fan, J. (2009). Research on the application of RSA asymmetric encryption algorithm in digital signatures. Communication Technology, (3), 192-193.
He, J., Jiang, L., Liao, Q., & Wang, X. (2018). Research on the security of the JSON-based RSA-PKCS# 1 encryption algorithm. Information Technology and Cybersecurity, 37(1), 25-29.
Chen, Q. (1999). Comparison of digital signature algorithms and their applications. Application Research in Computers, 16(10), 10-11.
Zhu, Y., & Cai, G. (2009). Security analysis and improvement of an RSA group signature scheme. Journal of Hubei University of Technology, (1), 68-70.
Shoup, V. (2000). Practical Threshold Signatures. In B. Preneel (Ed.), Advances in Cryptology — EUROCRYPT 2000 (Lecture Notes in Computer Science, vol 1807). Springer, Berlin, Heidelberg.
Liang, X., Sheng, H., & Zhou, X. (2006). Research on RSA Algorithm Mechanism. Computer Security, (12), 26-28.
Sun, Y. (2017). Research on lattice-based RSA small decryption index attack [D]. Beijing Jiaotong University.
Boneh, D., & Durfee, G. (1999). Cryptanalysis of RSA with Private Key d Less than N 0.292. In J. Stern (Ed.), Advances in Cryptology — EUROCRYPT ’99 (Lecture Notes in Computer Science, vol 1592). Springer, Berlin, Heidelberg.
Antonov, P., & Georgieva, N. (2024). Cipher Attack Against the Assymetric Cipher RSA. In T. Tagarev & N. Stoianov (Eds.), Digital Transformation, Cyber Security and Resilience (DIGILIENCE 2020, Communications in Computer and Information Science, vol 1790). Springer.
Wang, Y. (2020). Research on quantum attack method of RSA cryptography [D]. Wuhan University.
El Makkaoui, K., Lamriji, Y., Ouahbi, I., Nabil, O., Bouzahra, A., & Beni-Hssane, A. (2022). Fast Modular Exponentiation Methods for Public-Key Cryptography. In 2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet) (pp. 1-6). Marrakech, Morocco.
Guo, S., & Han, W. (2009). An optimization approach to the RSA cryptographic algorithm. Microcomputer Information, 25(3), 63-64..
Downloads
Published
Conference Proceedings Volume
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.