Security of RSA - GeeksforGeeks (2024)

  • Read

  • Improve

    Prerequisite – RSA Algorithm in Cryptography

    Security of RSA:-
    These are explained as following below.

    1. Plain text attacks:
    It is classified into 3 subcategories:-

    • Short message attack:
      In this we assume that attacker knows some blocks of plain text and tries to decode cipher text with the help of that. So, to prevent this pad the plain text before encrypting.
    • Cycling attack:
      In this attack, the attacker thinks that the cipher text has been generated by using some permutation. He uses all possible permutations of plain text to decipher the cipher text by ‘cycling’ the permutations.
    • Unconcealed Message attack:
      Sometimes it happens that plain text is same as cipher text after encryption. So it must be checked or it will be of no use as the attacker will see right through it.

    2. Chosen cipher attack:
    In this attacker is able to find out plain text based on cipher text using the Extended Euclidean Algorithm.

    3. Factorization attack:
    If the attacker is able to know P and Q using N, then he can find out value of private key. This fails when N contains at least 300 longer digits in decimal terms, attacker will not able to find it. Hence this is infeasible for larger numbers.

    4. Attacks on Encryption key:
    People well versed with the mathematics of RSA sometimes feel that it is quite easy because it can need a huge number for the public key or encryption key E. It also creates RSA more secure. Therefore, if it can decide to try and create the working of RSA faster by utilizing a small value for E, it can lead to potential attacks known as attacks on the encryption key and therefore it is suggested that it can use E as 216 + 1 = 65537 or a value nearer to this number.

    5. Attacks on Decryption key:

    • Revealed decryption exponent attack:
      If attacker somehow guess decryption key D, not only the cipher text generated by encryption the plain text with corresponding encryption key is in danger, but even future messages are also in danger. So, it is advised to take fresh values of two prime numbers (i.e.: P and Q), N and E.
    • Low decryption exponent attack:
      If we take smaller value of D in RSA this may occur so to avoid this take value of D = 2^16+1(at least).

    Level Up Your GATE Prep!
    Embark on a transformative journey towards GATE success by choosing Data Science & AI as your second paper choice with our specialized course. If you find yourself lost in the vast landscape of the GATE syllabus, our program is the compass you need.


    Commit to GfG's Three-90 Challenge! Purchase a course, complete 90% in 90 days, and save 90% cost click here to explore.

    Last Updated : 13 Feb, 2023

    Like Article

    Save Article

    Share your thoughts in the comments

    Please Login to comment...

    Security of RSA - GeeksforGeeks (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Msgr. Benton Quitzon

    Last Updated:

    Views: 5847

    Rating: 4.2 / 5 (43 voted)

    Reviews: 82% of readers found this page helpful

    Author information

    Name: Msgr. Benton Quitzon

    Birthday: 2001-08-13

    Address: 96487 Kris Cliff, Teresiafurt, WI 95201

    Phone: +9418513585781

    Job: Senior Designer

    Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

    Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.