Statements (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cryptanalysis technique
|
gptkbp:appliesTo |
gptkb:RSA_algorithm
|
gptkbp:countermeasures |
constant-time implementations
side-channel resistance avoid small public exponents randomized blinding use large key sizes use secure padding schemes |
gptkbp:field |
computer security
cryptography information security |
gptkbp:goal |
decrypt ciphertext
recover private key |
https://www.w3.org/2000/01/rdf-schema#label |
RSA cryptanalysis
|
gptkbp:notableBattle |
gptkb:Coppersmith's_attack
gptkb:Bleichenbacher's_attack gptkb:Boneh-Durfee_attack gptkb:Wiener's_attack |
gptkbp:relatedTo |
public key cryptography
integer factorization problem cryptographic security |
gptkbp:uses |
side-channel attacks
padding oracle attacks fault attacks timing attacks chosen ciphertext attacks low public exponent attacks common modulus attacks factorization of modulus mathematical attacks |
gptkbp:bfsParent |
gptkb:Pollard's_p-1_algorithm
|
gptkbp:bfsLayer |
7
|