11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8<br />

Conclusion<br />

In this chapter, we conclude the thesis. We have studied weaknesses <strong>of</strong> <strong>RSA</strong> cryptosystem,<br />

and results related to integer factorization, throughout Chapters 3 to 7.<br />

We exploited the vulnerabilities <strong>of</strong> <strong>RSA</strong> arising due to weak encryption/decryption<br />

keys, information about the bits <strong>of</strong> <strong>RSA</strong> primes, and implicit knowledge about the<br />

same. Most <strong>of</strong> our results are based on lattice basis reduction techniques applied<br />

to finding solutions to integer and modular polynomials.<br />

We revisit the chapters one-by-one to summarize the thesis. We mention the<br />

existing results and prior work (if any) in the direction. Most importantly, we<br />

present the crux <strong>of</strong> the chapters, that is our contributions, improvements and extensions<br />

to existing methods. Finally, we also discuss the future scope for research<br />

and potential open problems in respective field <strong>of</strong> study.<br />

8.1 Summary <strong>of</strong> Technical Results<br />

Chapter 1 provided the introduction to the thesis, while Chapter 2 covered some<br />

mathematical topics the reader should know before reading the thesis comfortably.<br />

The main technical results <strong>of</strong> the thesis are discussed in Chapters 3 to 7, and the<br />

highlights <strong>of</strong> these chapters are as follows.<br />

149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!