A cubic RSA code equivalent to factorization

J. H. Loxton*, David S P Khoo, Gregory J. Bird, Jennifer Seberry

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    19 Citations (Scopus)


    The RSA public-key encryption system of Rivest, Shamir, and Adelman can be broken if the modulus, R say, can be factorized. However, it is still not known if this system can be broken without factorizing R. A version of the RSA scheme is presented with encryption exponent e ≡ 3 (mod 6). For this modified version, the equivalence of decryption and factorization of R can be demonstrated.

    Original languageEnglish
    Pages (from-to)139-150
    Number of pages12
    JournalJournal of Cryptology
    Issue number2
    Publication statusPublished - Jan 1992


    • Cubic residues
    • Eisenstein integers
    • Encryption
    • Factorization
    • Public-key
    • RSA


    Dive into the research topics of 'A cubic RSA code equivalent to factorization'. Together they form a unique fingerprint.

    Cite this