Cryptosystem Algorithms and Data Structures System Presentation

In this project, you will do some cryptanalysis and experiment some attacks on RSA. You need to report the necessary details related to each attack. This project requires additional readings on RSA attacks and programming skills for the implementation. Problem and Requirements: (Please see the Blackboard/Discussion for updates) Given an RSA scheme, your goal is to find some weakness in the scheme by implementing and testing some of known RSA attack. In each of the following attack, you need to setup an RSA scheme with certain parameters that allow you to demonstrate the attack. You may consider the following attacks: (a) Factorization (b) Chose-ciphertext attack (c) Encryption exponent (d) Decryption exponent (e) Plaintext (short messages, cyclic, unconcealed, …etc.) (f) Common modulus (g) Timing attack Evaluation: The evaluation of this project is based on the quality of the examples presented in each attack. Decent examples get high evaluations, while trivial examples may get poor evaluation.

Sample Solution