Generating visible RSA public keys for PKI

被引:3
|
作者
C.S. Laih
K.Y. Chen
机构
[1] National Cheng Kung University,Department of Electrical Engineering
关键词
RSA; Integer factorization; Certificate; Public key generation;
D O I
10.1007/s10207-003-0030-8
中图分类号
学科分类号
摘要
In this paper, we propose the general procedures for generating a visible RSA public key for overcoming the drawback of people (without cryptographic background) not understanding what is meant by “public key”. Instead of generating a randomlike public key, a visible public key system allows the user to use a predefined image (e.g., picture, photo, signet, or handwriting signature) as his/her visible public key such that other users can decode the image as the receiver’s/signer’s public key directly for encrypting a message or verifying a signature. Of course, our procedures can also be applied to a predefined sound and/or video to generate an audible or audio-visual public key. Two algorithms for generating visible RSA public keys based on generating RSA moduli with a predetermined portion are proposed. One is suitable for the environment where all users use a common exponent, and the other is for different exponents. The constructions are almost as efficient as the generation of RSA moduli with a predetermined portion. The quality of the resulting visible public keys is almost the same as the original image, without compromising security. Experimental results show that the size and quality of visible public keys can be accepted by human eyes for practical applications.
引用
收藏
页码:103 / 109
页数:6
相关论文
共 50 条
  • [31] Generating sequential keys
    Lusk, R
    DR DOBBS JOURNAL, 1996, 21 (02): : 12 - &
  • [32] RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust
    Anada, Hiroaki
    Yasuda, Takanori
    Kawamoto, Junpei
    Weng, Jian
    Sakurai, Kouichi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 10 - 19
  • [33] A database record encryption scheme using the RSA public key cryptosystem and its master keys
    Chang, CC
    Chan, CW
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 345 - 348
  • [34] Generation of shared RSA keys by two parties
    Poupard, G
    Stern, J
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 11 - 24
  • [35] Factorizing RSA Keys, An Improved Analogue Solution
    Blakey, Ed
    NEW GENERATION COMPUTING, 2009, 27 (02) : 159 - 176
  • [36] Storing RSA private keys in your head
    Krivoruchko, Taisya
    Diamond, James
    Hooper, Jeff
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 129 - +
  • [37] Factorizing RSA Keys, An Improved Analogue Solution
    Ed Blakey
    New Generation Computing, 2009, 27 : 159 - 176
  • [38] Factorizing RSA Keys (An Improved Analogue Solution)
    Blakey, Ed
    NATURAL COMPUTING, PROCEEDINGS, 2009, 1 : 16 - 27
  • [39] Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys
    Janovsky, Adam
    Nemec, Matus
    Svenda, Petr
    Sekan, Peter
    Matyas, Vashek
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 505 - 524
  • [40] A new method for generating keys
    Jia, JP
    Yang, H
    ICSP '96 - 1996 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PROCEEDINGS, VOLS I AND II, 1996, : 1570 - 1573