Quantcast
Channel: FranceWebAssociation>> C'est Moi, C'est Vous, C'est Nous , Collaborer, Anticiper, Innover>si tu as une idée, que j'ai une idée et que l'on échange nos idées, nous aurons chacun deux idées>A la rencontre d’initiatives positives au niveau humain. - international
Viewing all articles
Browse latest Browse all 596

FranceWebAsso & MyNewsCenterNavigator, Research Starts Here : The two fundamental axioms, Shannon’s Maxim and Kerckhoffs’s Principle,

$
0
0

1agld1r.gifLeading Global Enterprise Risk Management and Model Risk Management Practices

The Need for Speedy Information Online

Your Way to Better Search Results

The best engine from one place

Know why, Know who, Know where, Know what. The know how to succeed. 

           Reach 5 Million People With One Click

1agld1r.gifAvec notre base de données , valorisez votre capital data en toute confiance 

WEB PAGES, NEWSPAPERS, ARTS, ARTICLES, NEWSGROUPS, BLOGS, BRIEFING, BUSINESS, CULTURE, ECONOMIY, ENTREPRENEURS, EDUCATION, FINANCE, IDEAS, HEALTH, MARKETS, LEADERSHIP, LIFE, MULTIMEDIA, OPINION, SPORTS, TECHNOLOGY, TECH, WORLD, POLITICS, PUBLIC DATABASES, MAILING LISTS AND MORE...

ABC Australian Business | abcNEWS  | AFP |AllYouCanRead |Argumenti i Fakti | Asahi | Asia Times | Asia Singapore | atNewYork | B2B Manufacturers Directory China&Taiwan | BBC News | BizEurope | Bloomberg Global News | Boston Globe | Business DailyCanadian Business OnlineCBS NewsChannel News | Chicago Tribune | China News | China News French | Christian Science Monitor| CNET | CNNDaily News |CRAYON| Daily Earth | Daily News | DMOZ | E-Commerce Times | ENN Enviromental News Network | Enterprise News for IT | Finance | Financial Times | Forbes | Foreign Policy | Fox News | Gazeta | German News | Google | Google News France | Gulf Daily News | Importdatabase | InfoWorld | InformationWeek | Interfax  |Investors Business Daily IPL Newspapers  | International Import Portal | Israel News | Itogi | IzvestiaLA Daily News | LCI | Literaturnaia Gazeta | Los Angeles TimesMajor Metros | Moreover | MSN bc | My Yahoo! | NASA | NewsIsFree | NewsVoyager | New York Post | New York Times | Newsday | Newsweek  | Nikkei Net Interactive | NPR | Other Newspapers | Pravda | Red Herring | Reuters | SKY NEWS| Slate | Terra Daily | The Mirror | The Wall Street Journal | The Washington Times | Time | TIMES ONLINE | UN News Centre | UPI | USA TodayU.S.News | Vedomosti | Wired|World France24 | World News | World News Business | WN Countries  |  World News Anyththing | World News Sites | World News Today |World News Travel |Yahoo France | Yahoo World |ZATAZ Magazine | ZDNet | TED | CRI | Bing News |SOHO Resources | AmEx Small Biz Exchange | BPlans.com | Business Forms | EntreWorld | Government Resources | Small Business State Profiles | Yahoo Small BusinessIRS Small Business | Tax Checklist | MSN Investor | Morningstar | Motley Fool | The Street | Silicon Investor | Raging BullSuperstar Investor | Whisper Numbers |Financial Data Finder | FinWeb | IOMA Business Directory | Research LinksArea Code Finder | Switchboard | Int'l Dialing Codes | 800 Directory | Yellow PagesZip Code Finder (Business) | Nielsen Ratings | Code of Federal Regulations | Tax Code | U.S. Code| WallStreet & Technology |Top US News Sites |World News Sites | Magazines |

Number Field Sieve Cryptanalysis Algorithms for Most Efficient Prime Factorization on Composites


Yogesh Malhotra


Global Risk Management Network, LLC

May 3, 2013

Abstract:     
Real defense or sustained viability of any encryption standard or encryption algorithm depends upon the “practical impossibility, in any foreseeable future” of “factoring the product of two large primes”. Hence, the factoring algorithms that make the process of breaking such encryption benchmarks easier, cheaper, and faster are of vital importance. For instance, Number Field Sieve (NFS), in its various forms, is currently recognized as the most powerful family of factoring algorithms used in most recent factoring attacks on global online financial transactions and payments encryption mechanisms. Based upon in-depth technical and mathematical analysis of the NFS and extrapolation of the trend of RSA encryption standards that have already been known to be compromised, plausibility of the current global 'gold standard' of online encryption, RSA-1024, having also been probably compromised in the wild, even though not disclosed publicly, is considered. The analysis is further substantiated by the plethora of recent public evidence about increasingly alarming and devastating cyber-intrusion attacks in the history of the WWW.

The two fundamental axioms, Shannon’s Maxim and Kerckhoffs’s Principle, underlying the formulation of cryptography and encryption standards are analyzed to examine how they can be advanced in order to develop more robust encryption and cryptography mechanisms that can withstand the onslaught of attacks using increasingly sophisticated and efficient cryptanalysis algorithms such as NFS. The reformulations of the two fundamental axioms underlying the formulation of cryptography and encryption standards are proposed based on earlier research in the form of the ‘principle of no secret keys’. Specifically, Shannon’s maxim: “The enemy knows the system” is hence reformulated as “The enemy knows the system, but you ‘know’ better.” Specifically, Kerckhoffs’s principle: “A cryptosystem should be secure even if the attacker knows all details about the system, with the exception of the secret key.” is hence reformulated as “A cryptosystem should be secure even if the attacker knows all details about the system including the secret key.” These reformulations of the fundamental axioms of cryptography and cryptanalsyis are anticipated to contribute to development of more robust encryption mechanisms.

 

Note: Within four weeks of the original publication of this research report, Google announced its intent to switch from RSA-1024 to RSA-2048. The original report was published about two weeks before the revelation of the Snowden affair in the public media.

Number of Pages in PDF File: 25

Keywords: Cryptography, Encryption, Shannon’s Maxim, Kerckhoffs's Principle, Cryptanalysis Algorithms, Special Purpose Factoring Algorithms (SPFA), General Purpose Factoring Algorithms (GPFA), Algebraic Number Field Sieves, Number Field Sieve Algorithms, Primes Factorization, RSA-1024, RSA-2048

JEL Classification: C00, C6, C60, C63, C69, C8, D8, D80, D81, D82, D83, D84, L63, L86, F1, G1, O3

 

Open PDF in BrowserDownload This Paper

Date posted: January 24, 2015 ; Last revised: April 25, 2016

Suggested Citation

Malhotra, Yogesh, Number Field Sieve Cryptanalysis Algorithms for Most Efficient Prime Factorization on Composites (May 3, 2013). Available at SSRN: http://ssrn.com/abstract=2553544 or http://dx.doi.org/10.2139/ssrn.2553544

Contact Information

Yogesh Malhotra (Contact Author)
Global Risk Management Network, LLC ( email )
Cornell Business and Technology Park
Ithaca, NY 14852-4892
United States
 

Viewing all articles
Browse latest Browse all 596

Trending Articles