|
@@ -120,11 +120,12 @@ mathematical tests performed in the university cluster.
|
|
|
|
|
|
\paragraph{Wiener.} The attack described in chapter \ref{chap:wiener} was the
|
|
|
first employed, being the fastest one above all others. Recalling the different
|
|
|
-public exponents we probed (discussed in the previous sections), we expected all
|
|
|
-private exponents to be $> \rfrac{1}{3}\sqrt[4]{N}$; there is still the
|
|
|
-possibility that the attack works, but there is no guarantee.
|
|
|
-For what concerns our tests, we found no weak keys that could be recovered using
|
|
|
-Wiener's attack.
|
|
|
+public exponents we probed and discussed in the preceeding section (all $\leq
|
|
|
+65537$), we expected all private expenents to be $> \rfrac{1}{3}\sqrt[4]{N}$
|
|
|
+and therefore not vulnerable to this particular version of Wiener's attack.
|
|
|
+Indeed, we found no weak keys with respect to this attack. Though, as
|
|
|
+pointed out in \cite{20years} \S 3, there is still the possibilty that the
|
|
|
+public keys we collected could be broken employing some variants of it.
|
|
|
|
|
|
\paragraph{GCD.} On the wave of \cite{ron:whit}, whe attempted also to perform
|
|
|
the $\gcd$ of every possible pair of dinstinct public modulus present in the
|