Next Article in Journal
Investigation of Partial Shading Scenarios on a Photovoltaic Array’s Characteristics
Next Article in Special Issue
Sensitivity Analysis for Vulnerability Mitigation in Hybrid Networks
Previous Article in Journal
Performance Evaluation of UAV-Based NOMA Networks with Hardware Impairment
Previous Article in Special Issue
RPPUF: An Ultra-Lightweight Reconfigurable Pico-Physically Unclonable Function for Resource-Constrained IoT Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Small Prime Divisors Attack and Countermeasure against the RSA-OTP Algorithm

1
Digital Core Design, 41-902 Bytom, Poland
2
Department of Digital Systems, Silesian University of Technology, 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(1), 95; https://doi.org/10.3390/electronics11010095
Submission received: 7 November 2021 / Revised: 14 December 2021 / Accepted: 24 December 2021 / Published: 28 December 2021
(This article belongs to the Special Issue Advanced Security, Trust and Privacy Solutions for Wireless Networks)

Abstract

One-time password algorithms are widely used in digital services to improve security. However, many such solutions use a constant secret key to encrypt (process) one-time plaintexts. A paradigm shift from constant to one-time keys could introduce tangible benefits to the application security field. This paper analyzes a one-time password concept for the Rivest–Shamir–Adleman algorithm, in which each key element is hidden, and the value of the modulus is changed after each encryption attempt. The difference between successive moduli is exchanged between communication sides via an unsecure channel. Analysis shows that such an approach is not secure. Moreover, determining the one-time password element (Rivest–Shamir–Adleman modulus) can be straightforward. A countermeasure for the analyzed algorithm is proposed.
Keywords: RSA; OTP; one-time password; RSA-OTP; small prime divisors attack; cryptography; encryption RSA; OTP; one-time password; RSA-OTP; small prime divisors attack; cryptography; encryption

Share and Cite

MDPI and ACS Style

Sarna, S.; Czerwinski, R. Small Prime Divisors Attack and Countermeasure against the RSA-OTP Algorithm. Electronics 2022, 11, 95. https://doi.org/10.3390/electronics11010095

AMA Style

Sarna S, Czerwinski R. Small Prime Divisors Attack and Countermeasure against the RSA-OTP Algorithm. Electronics. 2022; 11(1):95. https://doi.org/10.3390/electronics11010095

Chicago/Turabian Style

Sarna, Szymon, and Robert Czerwinski. 2022. "Small Prime Divisors Attack and Countermeasure against the RSA-OTP Algorithm" Electronics 11, no. 1: 95. https://doi.org/10.3390/electronics11010095

APA Style

Sarna, S., & Czerwinski, R. (2022). Small Prime Divisors Attack and Countermeasure against the RSA-OTP Algorithm. Electronics, 11(1), 95. https://doi.org/10.3390/electronics11010095

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop