Statements (32)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cryptanalysis_technique
|
| gptkbp:appliesTo |
gptkb:RSA_algorithm
|
| gptkbp:countermeasures |
constant-time implementations
side-channel resistance avoid small public exponents randomized blinding use large key sizes use secure padding schemes |
| gptkbp:field |
computer security
cryptography information security |
| gptkbp:goal |
decrypt ciphertext
recover private key |
| gptkbp:notableBattle |
gptkb:Coppersmith's_attack
gptkb:Bleichenbacher's_attack gptkb:Boneh-Durfee_attack gptkb:Wiener's_attack |
| gptkbp:relatedTo |
public key cryptography
integer factorization problem cryptographic security |
| gptkbp:uses |
side-channel attacks
padding oracle attacks fault attacks timing attacks chosen ciphertext attacks low public exponent attacks common modulus attacks factorization of modulus mathematical attacks |
| gptkbp:bfsParent |
gptkb:Pollard's_p-1_algorithm
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
RSA cryptanalysis
|