Leading Global Enterprise Risk Management and Model Risk Management Practices
The Need for Speedy Information Online
Your Way to Better Search Results
The best engine from one place
Know why, Know who, Know where, Know what. The know how to succeed.
Reach 5 Million People With One Click
Avec notre base de données , valorisez votre capital data en toute confiance
WEB PAGES, NEWSPAPERS, ARTS, ARTICLES, NEWSGROUPS, BLOGS, BRIEFING, BUSINESS, CULTURE, ECONOMIY, ENTREPRENEURS, EDUCATION, FINANCE, IDEAS, HEALTH, MARKETS, LEADERSHIP, LIFE, MULTIMEDIA, OPINION, SPORTS, TECHNOLOGY, TECH, WORLD, POLITICS, PUBLIC DATABASES, MAILING LISTS AND MORE...
ABC Australian Business | abcNEWS | AFP |AllYouCanRead |Argumenti i Fakti | Asahi | Asia Times | Asia Singapore | atNewYork | B2B Manufacturers Directory China&Taiwan | BBC News | BizEurope | Bloomberg Global News | Boston Globe | Business Daily | Canadian Business Online | CBS News| Channel News | Chicago Tribune | China News | China News French | Christian Science Monitor| CNET | CNNDaily News |CRAYON| Daily Earth | Daily News | DMOZ | E-Commerce Times | ENN Enviromental News Network | Enterprise News for IT | Finance | Financial Times | Forbes | Foreign Policy | Fox News | Gazeta | German News | Google | Google News France | Gulf Daily News | Importdatabase | InfoWorld | InformationWeek | Interfax |Investors Business Daily| IPL Newspapers | International Import Portal | Israel News | Itogi | Izvestia | LA Daily News | LCI | Literaturnaia Gazeta | Los Angeles Times | Major Metros | Moreover | MSN bc | My Yahoo! | NASA | NewsIsFree | NewsVoyager | New York Post | New York Times | Newsday | Newsweek | Nikkei Net Interactive | NPR | Other Newspapers | Pravda | Red Herring | Reuters | SKY NEWS| Slate | Terra Daily | The Mirror | The Wall Street Journal | The Washington Times | Time | TIMES ONLINE | UN News Centre | UPI | USA Today | U.S.News | Vedomosti | Wired|World France24 | World News | World News Business | WN Countries | World News Anyththing | World News Sites | World News Today |World News Travel |Yahoo France | Yahoo World |ZATAZ Magazine | ZDNet | TED | CRI | Bing News |SOHO Resources | AmEx Small Biz Exchange | BPlans.com | Business Forms | EntreWorld | Government Resources | Small Business State Profiles | Yahoo Small Business | IRS Small Business | Tax Checklist | MSN Investor | Morningstar | Motley Fool | The Street | Silicon Investor | Raging Bull | Superstar Investor | Whisper Numbers |Financial Data Finder | FinWeb | IOMA Business Directory | Research Links | Area Code Finder | Switchboard | Int'l Dialing Codes | 800 Directory | Yellow Pages | Zip Code Finder (Business) | Nielsen Ratings | Code of Federal Regulations | Tax Code | U.S. Code| WallStreet & Technology |Top US News Sites |World News Sites | Magazines |
Number Field Sieve Cryptanalysis Algorithms for Most Efficient Prime Factorization on Composites
Yogesh Malhotra
Global Risk Management Network, LLC
May 3, 2013
Abstract:
The two fundamental axioms, Shannon’s Maxim and Kerckhoffs’s Principle, underlying the formulation of cryptography and encryption standards are analyzed to examine how they can be advanced in order to develop more robust encryption and cryptography mechanisms that can withstand the onslaught of attacks using increasingly sophisticated and efficient cryptanalysis algorithms such as NFS. The reformulations of the two fundamental axioms underlying the formulation of cryptography and encryption standards are proposed based on earlier research in the form of the ‘principle of no secret keys’. Specifically, Shannon’s maxim: “The enemy knows the system” is hence reformulated as “The enemy knows the system, but you ‘know’ better.” Specifically, Kerckhoffs’s principle: “A cryptosystem should be secure even if the attacker knows all details about the system, with the exception of the secret key.” is hence reformulated as “A cryptosystem should be secure even if the attacker knows all details about the system including the secret key.” These reformulations of the fundamental axioms of cryptography and cryptanalsyis are anticipated to contribute to development of more robust encryption mechanisms.
Note: Within four weeks of the original publication of this research report, Google announced its intent to switch from RSA-1024 to RSA-2048. The original report was published about two weeks before the revelation of the Snowden affair in the public media.
Number of Pages in PDF File: 25
Keywords: Cryptography, Encryption, Shannon’s Maxim, Kerckhoffs's Principle, Cryptanalysis Algorithms, Special Purpose Factoring Algorithms (SPFA), General Purpose Factoring Algorithms (GPFA), Algebraic Number Field Sieves, Number Field Sieve Algorithms, Primes Factorization, RSA-1024, RSA-2048
JEL Classification: C00, C6, C60, C63, C69, C8, D8, D80, D81, D82, D83, D84, L63, L86, F1, G1, O3
Open PDF in BrowserDownload This Paper
Date posted: January 24, 2015 ; Last revised: April 25, 2016
Suggested Citation
Contact Information
Yogesh Malhotra (Contact Author)Global Risk Management Network, LLC ( email ) Cornell Business and Technology Park Ithaca, NY 14852-4892 United States |