Title | RSA kriptosustav i njegova kriptoanaliza |
Author | Ines Spaić |
Mentor(s) | Ivan Soldo (thesis advisor)
|
Abstract | U današnje doba digitalizacije i sve učestalijom komunikacijom putem interneta,
pametnih telefona i sl., kriptosustavi imaju sve važniju ulogu u životu svakog
pojedinca, jer nam omugućavaju zaštitu naše privatnosti. Jedan od najpoznatijih
kriptosustava s javnim ključem je RSA kriptosustav. Temelji se na teškoći faktorizacije
velikih prirodnih brojeva. Rad se sastoji od tri cjeline. U prvom poglavlju
rada definirali smo kriptosustave s javnim ključem, te primjerom ilustrirali kako taj
kriptosustav funkcionira. U drugom poglavlju dana je teorijska osnova za RSA kriptosustav,
te njegova implementacija. U ovom je poglavlju također opisana sigurnost
i učinkovitost RSA kriptosustava. U posljednjem poglavlju naveli smo neke napade
na RSA kriptosustav, te prednosti i nedostatke korištenja malih javnih i privatnih
eksponenata. |
Keywords | Cryptography public key RSA cryptosystem cryptanalysis public exponent private exponent Wiener attack |
Granter | Josip Juraj Strossmayer University of Osijek Department of Mathematics |
Lower level organizational units | Chair of Pure Mathematics Algebra and Calculus Research Group |
Place | Osijek |
State | Croatia |
Scientific field, discipline, subdiscipline | NATURAL SCIENCES Mathematics Algebra
|
Study programme type | university |
Study level | integrated undergraduate and graduate |
Study programme | Mathematics and Computer Science |
Academic title abbreviation | mag. educ. math. et inf. |
Genre | master's thesis |
Language | Croatian |
Defense date | 2017-10 |
Parallel abstract (English) | Nowadays of digitalization, with more communication over the internet, smarth
phones etc., cryptosystems have an important role in life of almost every human.
They give us the protection of our privacy. The RSA cryptosystem is one of the
most known cryptosystems with public key. It is based on the difficulty of integer
factorization. This work is based on three chapters. In the first chapter, we have
defined cryptosystem with public keys, and with example illustrated how that cryptosystem
works. In the next chapter, we presented some theoretical results which
are the base for RSA cryptosystem, and gave some of it’s implementations. Moreover,
we mentioned security and efficiency of RSA cryptosystem. In the last chapter,
we described some attacks on RSA cryptosystem, and mentioned advantages and
disadvantages, respectively, of small public and private exponents. |
Parallel keywords (Croatian) | Kriptografija javni ključ RSA kriptosustav kriptoanaliza javni eksponent privatni eksponent Wienerov napad |
Resource type | text |
Access condition | Open access |
Terms of use |  |
URN:NBN | https://urn.nsk.hr/urn:nbn:hr:126:515845 |