14.07.2013 Views

dissertacao.pdf

dissertacao.pdf

dissertacao.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4 Conclusions<br />

The several attacks presented in this work, or any other known attack, have<br />

not rendered the RSA cryptosystem unsafe. There is good prospects that some<br />

attacks, specially the ones by Boneh and Durfee and Blomer and May will<br />

become more powerful as soon as we get more knowledge on what we called The<br />

Coppersmith Method Conjectures. These conjectures seem to be closely related<br />

with the security of RSA and proving them would be definitely useful.<br />

However, none of these heuristic attacks seems to threat RSA security com-<br />

pletely. New bounds will be set and new precautions will be needed. But the<br />

most important criteria for the RSA safety is still the Large Integer Factorization<br />

Problem. Though there have been several advances in this area, an algorithm<br />

running in polynomial time to factor large integers is still not known.<br />

The experiments on this work have not led to any new results but we hope<br />

that, along with the simple implementations presented, they can motivate the<br />

reader to further explore the existing attacks on RSA and to think how one can<br />

improve them.<br />

One topic that deserves more study is the variants of RSA. They present<br />

exciting new possibilities but their security has not yet been as analysed as<br />

thoroughly as that of standard RSA. Its probably in them that the future of<br />

cryptography lies, so the sooner we understand them, the sooner it will be safer<br />

for us to rely on them.<br />

51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!