Cryptanalysis of RSA and Its Variants

M. Jason Hinek

July 21, 2009 by Chapman and Hall/CRC
Reference - 272 Pages - 19 B/W Illustrations
ISBN 9781420075182 - CAT# C7518
Series: Chapman & Hall/CRC Cryptography and Network Security Series

was $99.95


SAVE ~$19.99

Add to Wish List
SAVE 25%
When you buy 2 or more print books!
See final price in shopping cart.
FREE Standard Shipping!


  • Treats the cryptanalysis of the main variants of RSA as a major topic—one of the first books to do so
  • Collects all of the best known mathematical attacks on RSA and its variants, providing detailed proofs and justifications of these attacks
  • Includes the most recent results for lattice techniques based on Coppersmith’s methods
  • Differentiates between provable attacks and those based on assumptions


Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its main variants, including CRT-RSA, multi-prime RSA, and multi-power RSA.

Divided into three parts, the book first introduces RSA and reviews the mathematical background needed for the majority of attacks described in the remainder of the text. It then brings together all of the most popular mathematical attacks on RSA and its variants. For each attack presented, the author includes a mathematical proof if possible or a mathematical justification for attacks that rely on assumptions. For the attacks that cannot be proven, he gives experimental evidence to illustrate their practical effectiveness.

Focusing on mathematical attacks that exploit the structure of RSA and specific parameter choices, this book provides an up-to-date collection of the most well-known attacks, along with details of the attacks. It facilitates an understanding of the cryptanalysis of public-key cryptosystems, applications of lattice basis reduction, and the security of RSA and its variants.