N
N
Nikolai Kargin2018-06-05 10:50:58
Burglary protection
Nikolai Kargin, 2018-06-05 10:50:58

How is the Meet-in-The-Middle attack on RSA implemented?

Actually follows from the name. I did not find anything sensible on the topic in such a bundle. The algorithm of the "meeting in the middle" attack on RSA is of interest.

Answer the question

In order to leave comments, you need to log in

1 answer(s)
O
Ocelot, 2018-06-05
@Ocelot

A variation of the Meet-in-The-Middle attack applicable to asymmetric cryptography is called "Baby-step, Giant-step", but it is suitable for systems on discrete logarithms, not for RSA.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question