dissertacao.pdf
dissertacao.pdf
dissertacao.pdf
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
4 Conclusions<br />
The several attacks presented in this work, or any other known attack, have<br />
not rendered the RSA cryptosystem unsafe. There is good prospects that some<br />
attacks, specially the ones by Boneh and Durfee and Blomer and May will<br />
become more powerful as soon as we get more knowledge on what we called The<br />
Coppersmith Method Conjectures. These conjectures seem to be closely related<br />
with the security of RSA and proving them would be definitely useful.<br />
However, none of these heuristic attacks seems to threat RSA security com-<br />
pletely. New bounds will be set and new precautions will be needed. But the<br />
most important criteria for the RSA safety is still the Large Integer Factorization<br />
Problem. Though there have been several advances in this area, an algorithm<br />
running in polynomial time to factor large integers is still not known.<br />
The experiments on this work have not led to any new results but we hope<br />
that, along with the simple implementations presented, they can motivate the<br />
reader to further explore the existing attacks on RSA and to think how one can<br />
improve them.<br />
One topic that deserves more study is the variants of RSA. They present<br />
exciting new possibilities but their security has not yet been as analysed as<br />
thoroughly as that of standard RSA. Its probably in them that the future of<br />
cryptography lies, so the sooner we understand them, the sooner it will be safer<br />
for us to rely on them.<br />
51