Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. The magic words are squeamish ossifrage [RSA public key cryptography]
 
conference paper

The magic words are squeamish ossifrage [RSA public key cryptography]

Atkins, D.
•
Graff, M.
•
Lenstra, Arjen K.  
Show more
1995
Advances in Cryptology - ASIACRYPT'94. 4th International Conference on the Theory and Applications of Cryptology. Proceedings
Advances in Cryptology - ASIACRYPT'94. 4th International Conference on the Theory and Applications of Cryptology. Proceedings

We describe the computation which resulted in the title of this paper. Furthermore, we give an analysis of the data collected during this computation. From this data, we derive the important observation that in the final stages, the progress of the double large prime variation of the quadratic sieve integer factoring algorithm can more effectively be approximated by a quartic function of the time spent, than by the more familiar quadratic function. We also present, as an update to “Factoring by electronic mail” by Lenstra and Manasse (1990), some of our experiences with the management of a large computation distributed over the Internet. Based on this experience, we give some realistic estimates of the current readily available computational power of the Internet. We conclude that commonly-used 512-bit RSA moduli are vulnerable to any organization prepared to spend a few million dollars and to wait a few months

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1007/BFb0000440
Author(s)
Atkins, D.
Graff, M.
Lenstra, Arjen K.  
Leyland, P. C.
Date Issued

1995

Published in
Advances in Cryptology - ASIACRYPT'94. 4th International Conference on the Theory and Applications of Cryptology. Proceedings
Series title/Series vol.

Lecture Notes in Computer Science; 917

Start page

263

End page

77

Subjects

algorithm theory

•

data privacy

•

Internet

•

number theory

•

public key cryptography

Editorial or Peer reviewed

REVIEWED

Written at

OTHER

EPFL units
LACAL  
Event nameEvent place
Advances in Cryptology - ASIACRYPT'94. 4th International Conference on the Theory and Applications of Cryptology. Proceedings

Berlin, Germany

Available on Infoscience
June 24, 2010
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/50996
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés