Q. Saeed, T. Basir, S. Ul Haq, N. Zia, M. A. Paracha
{"title":"现代公钥密码体制中的数学难题","authors":"Q. Saeed, T. Basir, S. Ul Haq, N. Zia, M. A. Paracha","doi":"10.1109/ICET.2006.335986","DOIUrl":null,"url":null,"abstract":"In secure network communication public-key algorithms are designed to resist chosen-plaintext attacks; their security is based both on the difficulty of deducing the secret key from the public key and difficulty of deducing the plaintext from the ciphertext. In this paper the two general types of hard problems - number factoring and discrete logarithms are explained. These apply to cryptosystems such as RSA, ElGamal, elliptic curve, Diffie-Hellman key exchange, and they are used in digital signature algorithms","PeriodicalId":238541,"journal":{"name":"2006 International Conference on Emerging Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Mathematical Hard Problems in Modern Public-Key Cryptosystem\",\"authors\":\"Q. Saeed, T. Basir, S. Ul Haq, N. Zia, M. A. Paracha\",\"doi\":\"10.1109/ICET.2006.335986\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In secure network communication public-key algorithms are designed to resist chosen-plaintext attacks; their security is based both on the difficulty of deducing the secret key from the public key and difficulty of deducing the plaintext from the ciphertext. In this paper the two general types of hard problems - number factoring and discrete logarithms are explained. These apply to cryptosystems such as RSA, ElGamal, elliptic curve, Diffie-Hellman key exchange, and they are used in digital signature algorithms\",\"PeriodicalId\":238541,\"journal\":{\"name\":\"2006 International Conference on Emerging Technologies\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 International Conference on Emerging Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICET.2006.335986\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2006.335986","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mathematical Hard Problems in Modern Public-Key Cryptosystem
In secure network communication public-key algorithms are designed to resist chosen-plaintext attacks; their security is based both on the difficulty of deducing the secret key from the public key and difficulty of deducing the plaintext from the ciphertext. In this paper the two general types of hard problems - number factoring and discrete logarithms are explained. These apply to cryptosystems such as RSA, ElGamal, elliptic curve, Diffie-Hellman key exchange, and they are used in digital signature algorithms