Generating visible RSA public keys for PKI

被引:3
|
作者
C.S. Laih
K.Y. Chen
机构
[1] National Cheng Kung University,Department of Electrical Engineering
关键词
RSA; Integer factorization; Certificate; Public key generation;
D O I
10.1007/s10207-003-0030-8
中图分类号
学科分类号
摘要
In this paper, we propose the general procedures for generating a visible RSA public key for overcoming the drawback of people (without cryptographic background) not understanding what is meant by “public key”. Instead of generating a randomlike public key, a visible public key system allows the user to use a predefined image (e.g., picture, photo, signet, or handwriting signature) as his/her visible public key such that other users can decode the image as the receiver’s/signer’s public key directly for encrypting a message or verifying a signature. Of course, our procedures can also be applied to a predefined sound and/or video to generate an audible or audio-visual public key. Two algorithms for generating visible RSA public keys based on generating RSA moduli with a predetermined portion are proposed. One is suitable for the environment where all users use a common exponent, and the other is for different exponents. The constructions are almost as efficient as the generation of RSA moduli with a predetermined portion. The quality of the resulting visible public keys is almost the same as the original image, without compromising security. Experimental results show that the size and quality of visible public keys can be accepted by human eyes for practical applications.
引用
收藏
页码:103 / 109
页数:6
相关论文
共 50 条
  • [41] 基于PKI的RSA加密算法研究
    周亮
    网络安全技术与应用, 2017, (09) : 48+72 - 48
  • [42] Rsa meets dpa: Recovering rsa secret keys from noisy analog data
    Kunihiro, Noboru
    Honda, Junya
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 261 - 278
  • [43] RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
    Kunihiro, Noboru
    Honda, Junya
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 261 - 278
  • [44] Public Keys
    Lenstra, Arjen K.
    Hughes, James P.
    Augier, Maxime
    Bos, Joppe W.
    Kleinjung, Thorsten
    Wachter, Christophe
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 626 - 642
  • [45] Generating RSA moduli with a predetermined portion
    Lenstra, AK
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 1 - 10
  • [46] PROTECTING PUBLIC KEYS AND SIGNATURE KEYS
    DENNING, DE
    COMPUTER, 1983, 16 (02) : 27 - 35
  • [47] Reducing the Complexity in the Distributed Computation of Private RSA Keys
    Lory, Peter
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 250 - 263
  • [48] A Practical Cold Boot Attack on RSA Private Keys
    Wang, Tian
    Cui, Xiaoxin
    Ni, Yewen
    Yu, Dunshan
    Cui, Xiaole
    Qu, Gang
    PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2017, : 55 - 60
  • [49] Generation of RSA keys that are guaranteed to be unique for each user
    Peyravian, M
    Matyas, SM
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 2000, 19 (03) : 282 - 288
  • [50] Recovering RSA Private Keys on Implementations with Tampered LSBs
    Patsakis, Constantinos
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 453 - 460