Abstract
The RSA public-key encryption system of Rivest, Shamir, and Adelman can be broken if the modulus, R say, can be factorized. However, it is still not known if this system can be broken without factorizing R. A version of the RSA scheme is presented with encryption exponent e ≡ 3 (mod 6). For this modified version, the equivalence of decryption and factorization of R can be demonstrated.
Original language | English |
---|---|
Pages (from-to) | 139-150 |
Number of pages | 12 |
Journal | Journal of Cryptology |
Volume | 5 |
Issue number | 2 |
DOIs | |
Publication status | Published - Jan 1992 |
Keywords
- Cubic residues
- Eisenstein integers
- Encryption
- Factorization
- Public-key
- RSA