The RSA algorithm has been around for nearly five decades and remains one of the most studied public key cryptosystems. Many attempts have been made to break it or improve it and questions remain about the equivalence of the strength of its security to well known hard problems in computational number theory. In this note we propose a modified version which we call RSA+ which is at least as secure as RSA and show that breaking RSA+ is probably computationally equivalent to factoring $n$, the public modulus. The motivation came from wanting to obscure the encryption exponent in RSA.
翻译:RSA算法已经存在近五十年,仍然是研究最多的公共关键加密系统之一,许多尝试试图打破或改进它,对于其安全强度是否等同于计算数字理论中众所周知的难题,仍有疑问。在本说明中,我们提出了一个我们称之为RSA+的修改版本,它至少与RSA一样安全,并表明打破RSA+很可能在计算上等同于计费美元,即公共模量值。其动机是想掩盖RSA的加密提示。