Generating visible RSA public keys for PKI

被引:3
|
作者
C.S. Laih
K.Y. Chen
机构
[1] National Cheng Kung University,Department of Electrical Engineering
关键词
RSA; Integer factorization; Certificate; Public key generation;
D O I
10.1007/s10207-003-0030-8
中图分类号
学科分类号
摘要
In this paper, we propose the general procedures for generating a visible RSA public key for overcoming the drawback of people (without cryptographic background) not understanding what is meant by “public key”. Instead of generating a randomlike public key, a visible public key system allows the user to use a predefined image (e.g., picture, photo, signet, or handwriting signature) as his/her visible public key such that other users can decode the image as the receiver’s/signer’s public key directly for encrypting a message or verifying a signature. Of course, our procedures can also be applied to a predefined sound and/or video to generate an audible or audio-visual public key. Two algorithms for generating visible RSA public keys based on generating RSA moduli with a predetermined portion are proposed. One is suitable for the environment where all users use a common exponent, and the other is for different exponents. The constructions are almost as efficient as the generation of RSA moduli with a predetermined portion. The quality of the resulting visible public keys is almost the same as the original image, without compromising security. Experimental results show that the size and quality of visible public keys can be accepted by human eyes for practical applications.
引用
收藏
页码:103 / 109
页数:6
相关论文
共 50 条
  • [1] A simple approach for generating RSA keys
    Chang, CC
    Hwang, SJ
    INFORMATION PROCESSING LETTERS, 1997, 63 (01) : 19 - 21
  • [2] GENERATING RSA KEYS WITHOUT THE EUCLID ALGORITHM
    DEROME, MFA
    ELECTRONICS LETTERS, 1993, 29 (01) : 19 - 21
  • [3] Parallel computation of the generating keys for RSA cryptosystems
    Chang, CC
    Hwang, MS
    ELECTRONICS LETTERS, 1996, 32 (15) : 1365 - 1366
  • [4] Fast generating method for keys of RSA cryptosystems
    Shi, Ronghua
    Hu, Xiangling
    Dianzi Keji Daxue Xuebao/Journal of University of Electronic Science and Technology of China, 1999, 28 (05): : 461 - 463
  • [5] Origin Attribution of RSA Public Keys
    Branca, Enrico
    Abazari, Farzaneh
    Carranza, Ronald Rivera
    Stakhanova, Natalia
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 374 - 396
  • [6] Measuring and Characterizing Propagation of Reuse RSA Certificates and Keys Across PKI Ecosystem
    Nezhadian, Fatemeh
    Branca, Enrico
    Barzolevskaia, Anna
    Natadze, Andrei
    Stakhanova, Natalia
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024,
  • [7] Is it wise to publish your public RSA keys?
    Gueron, Shay
    Seifert, Jean-Pierre
    FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 1 - 12
  • [8] Perturbating RSA public keys: An improved attack
    Berzati, Alexandre
    Canovas, Cecile
    Goubin, Louis
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 380 - +
  • [9] RSA Weak Public Keys Available on the Internet
    Barbulescu, Mihai
    Stratulat, Adrian
    Traista-Popescu, Vlad
    Simion, Emil
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 92 - 102
  • [10] STRONG RSA KEYS
    GORDON, J
    ELECTRONICS LETTERS, 1984, 20 (12) : 514 - 516