2011 International Conference on Communication Systems and Network Technologies 2011
DOI: 10.1109/csnt.2011.29
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Method to Factorize the RSA Public Key Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
30
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(32 citation statements)
references
References 4 publications
0
30
0
2
Order By: Relevance
“…In this algorithm, we only need to test out up to the square root of n, [11][12][13][14] meanwhile if suppose variable p is a factor, so q=N/p is also an alternative factor. If number of factors from 2… floor (√ N) (inclusive) are originate, the number is a prime.…”
Section: Trial Division Algorithmmentioning
confidence: 99%
“…In this algorithm, we only need to test out up to the square root of n, [11][12][13][14] meanwhile if suppose variable p is a factor, so q=N/p is also an alternative factor. If number of factors from 2… floor (√ N) (inclusive) are originate, the number is a prime.…”
Section: Trial Division Algorithmmentioning
confidence: 99%
“…B R Ambedkar et al [2] proposed the method modified from Fermat factorization. This method can finish all trivial and nontrivial value of n, called Modified Fermat Factorization (MFF).…”
Section: Introductionmentioning
confidence: 99%
“…Recently, there are many factorization algorithms such as Trial division algorithm [8], Fermat factorization algorithm [2,3] and Monte Carlo factorization algorithm [8]. Trial division is the simplest factorization algorithm [7].…”
Section: Introductionmentioning
confidence: 99%
“…However, the algorithm remains vulnerable to the factorization attack based on the value of modulo 'n' [11]- [15]. Factoring of the modulo reveals the two prime numbers, p, and q, which, together with the public key 'e', exposes the private key that needed for the decryption of messages [16], [17] of the modulo and several studies have also been done to secure the public key 'e' to provide another security barrier [12], [13], [18], [19].…”
Section: Introductionmentioning
confidence: 99%