![]() |
![]() |
#56 |
Apr 2020
19×37 Posts |
![]()
RSA100 begins with a 1. And in any case, the size of the number has nothing to do with the number of small primes in the factor base, which is unusually low for RSA100, making it harder to find relations.
|
![]() |
![]() |
![]() |
#57 |
"Ben"
Feb 2007
70418 Posts |
![]()
In the data set I collected, all C100's started with a 1 or 2. But the metric I'm measuring is independent of input size as it just looks at the factor base primes < 1000. I gathered essentially the same data on a group of random C110s and C120s.
|
![]() |
![]() |
![]() |
#58 |
Tribal Bullet
Oct 2004
5×709 Posts |
![]()
Anyone who wants to delve into the standard methods for generating RSA key pairs should read NIST SP800-56B, which references FIPS 186-4. There are size requirerments on both primes (not just their top bit being set) that force their product to have bit N set in an N-bit modulus.
None of the standards mandate engineering in any resistance to particular subexponential factoring algorithms; that's just a deviation from randomness that could backfire later if those algorithms ever change, and distracts from using key size to provide cryptographic strength. Last fiddled with by jasonp on 2021-03-24 at 21:04 |
![]() |
![]() |
![]() |
#59 | |
"Ben"
Feb 2007
E2116 Posts |
![]() Quote:
|
|
![]() |
![]() |
![]() |
#60 | |
"Tilman Neumann"
Jan 2016
Germany
24×31 Posts |
![]() Quote:
Maybe "safe" or "strong" primes may have played a role nonetheless? https://en.wikipedia.org/wiki/Safe_a...s#Cryptography Admittedly, I did not read many posts where RDS explained the selection procedure and can't even find the one I read before. Any references? |
|
![]() |
![]() |
![]() |
#61 | |
"Robert Gerbicz"
Oct 2005
Hungary
25×72 Posts |
![]() Quote:
https://www.mersenneforum.org/showpo...7&postcount=33 https://www.mersenneforum.org/showpo...2&postcount=23 |
|
![]() |
![]() |
![]() |
#62 | |
Tribal Bullet
Oct 2004
354510 Posts |
![]() Quote:
This is a very heavyweight process; for example, if you choose to use pseudoprimes that pass the strong Rabin-Miller test, the bases to use must be the output of a cryptographic quality random number generator just like P and Q are. There are loads of random bit generators that can be used, and anybody interested in this subject can start with NIST SP800-90 |
|
![]() |
![]() |
![]() |
#63 | |
"Tilman Neumann"
Jan 2016
Germany
24×31 Posts |
![]() Quote:
"We used a hardware RNG with calls to BSAFE to generate the primes" The kind of calls to BSAFE would be interesting, too. https://en.wikipedia.org/wiki/BSAFE That's just what I was talking about, I think... |
|
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Where do I send my PRP primes with large k? | Trilo | Riesel Prime Search | 3 | 2013-08-20 00:32 |
48-bit large primes! | jasonp | Msieve | 24 | 2010-06-01 19:14 |
NFS with 5 and 6 large primes | jasonp | Factoring | 4 | 2007-12-04 18:32 |
Why only three large primes | fivemack | Factoring | 18 | 2007-05-10 12:14 |
What is the use of these large primes | Prime Monster | Lounge | 34 | 2004-06-10 18:12 |