Browse Source

Revisiting description of wiener's test.

Michele Orrù 10 years ago
parent
commit
bb0f28028c
1 changed files with 6 additions and 5 deletions
  1. 6 5
      book/conclusions.tex

+ 6 - 5
book/conclusions.tex

@@ -120,11 +120,12 @@ mathematical tests performed in the university cluster.
 
 \paragraph{Wiener.} The attack described in chapter \ref{chap:wiener} was the
 first employed, being the fastest one above all others. Recalling the different
-public exponents we probed (discussed in the previous sections), we expected all
-private exponents to be $>  \rfrac{1}{3}\sqrt[4]{N}$; there is still the
-possibility that the attack works, but there is no guarantee.
-For what concerns our tests, we found no weak keys that could be recovered using
-Wiener's attack.
+public exponents we probed and discussed in the preceeding section (all $\leq
+65537$), we expected all private expenents to be $>  \rfrac{1}{3}\sqrt[4]{N}$
+and therefore not vulnerable to this particular version of Wiener's attack.
+Indeed, we found no weak keys with respect to this attack. Though, as
+pointed out in \cite{20years} \S 3, there is still the possibilty that the
+public keys we collected could be broken employing some variants of it.
 
 \paragraph{GCD.} On the wave of \cite{ron:whit}, whe attempted also to perform
 the $\gcd$ of every possible pair of dinstinct public modulus present in the