Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 8<br />
Conclusion<br />
In this chapter, we conclude the thesis. We have studied weaknesses <strong>of</strong> <strong>RSA</strong> cryptosystem,<br />
and results related to integer factorization, throughout Chapters 3 to 7.<br />
We exploited the vulnerabilities <strong>of</strong> <strong>RSA</strong> arising due to weak encryption/decryption<br />
keys, information about the bits <strong>of</strong> <strong>RSA</strong> primes, and implicit knowledge about the<br />
same. Most <strong>of</strong> our results are based on lattice basis reduction techniques applied<br />
to finding solutions to integer and modular polynomials.<br />
We revisit the chapters one-by-one to summarize the thesis. We mention the<br />
existing results and prior work (if any) in the direction. Most importantly, we<br />
present the crux <strong>of</strong> the chapters, that is our contributions, improvements and extensions<br />
to existing methods. Finally, we also discuss the future scope for research<br />
and potential open problems in respective field <strong>of</strong> study.<br />
8.1 Summary <strong>of</strong> Technical Results<br />
Chapter 1 provided the introduction to the thesis, while Chapter 2 covered some<br />
mathematical topics the reader should know before reading the thesis comfortably.<br />
The main technical results <strong>of</strong> the thesis are discussed in Chapters 3 to 7, and the<br />
highlights <strong>of</strong> these chapters are as follows.<br />
149