{"id":"https://openalex.org/W2967823908","doi":"https://doi.org/10.3390/cryptography3030020","title":"New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT","display_name":"New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT","publication_year":2019,"publication_date":"2019-08-15","ids":{"openalex":"https://openalex.org/W2967823908","doi":"https://doi.org/10.3390/cryptography3030020","mag":"2967823908"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography3030020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030020","pdf_url":"https://www.mdpi.com/2410-387X/3/3/20/pdf?version=1566441913","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/3/3/20/pdf?version=1566441913","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072259792","display_name":"Sitalakshmi Venkatraman","orcid":"https://orcid.org/0000-0002-2772-133X"},"institutions":[{"id":"https://openalex.org/I4403386716","display_name":"Melbourne Polytechnic","ror":"https://ror.org/04cq7wg91","country_code":null,"type":"education","lineage":["https://openalex.org/I4403386716"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Sitalakshmi Venkatraman","raw_affiliation_strings":["School of Engineering, Construction &amp; Design, Melbourne Polytechnic, Victoria 3181, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Construction &amp; Design, Melbourne Polytechnic, Victoria 3181, Australia","institution_ids":["https://openalex.org/I4403386716"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075768664","display_name":"Anthony Overmars","orcid":"https://orcid.org/0000-0001-7021-4774"},"institutions":[{"id":"https://openalex.org/I4403386716","display_name":"Melbourne Polytechnic","ror":"https://ror.org/04cq7wg91","country_code":null,"type":"education","lineage":["https://openalex.org/I4403386716"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Anthony Overmars","raw_affiliation_strings":["School of Engineering, Construction &amp; Design, Melbourne Polytechnic, Victoria 3181, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Construction &amp; Design, Melbourne Polytechnic, Victoria 3181, Australia","institution_ids":["https://openalex.org/I4403386716"]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072259792"],"corresponding_institution_ids":["https://openalex.org/I4403386716"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.0218,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.80960058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"3","issue":"3","first_page":"20","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7284150719642639},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6455367803573608},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6432137489318848},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6132706999778748},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.4591614007949829},{"id":"https://openalex.org/keywords/prime","display_name":"Prime (order theory)","score":0.43518996238708496},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1859789490699768}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7284150719642639},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6455367803573608},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6432137489318848},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6132706999778748},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.4591614007949829},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.43518996238708496},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1859789490699768},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography3030020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030020","pdf_url":"https://www.mdpi.com/2410-387X/3/3/20/pdf?version=1566441913","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:38a110303dda4247b7ce2b2acf698eaa","is_oa":true,"landing_page_url":"https://doaj.org/article/38a110303dda4247b7ce2b2acf698eaa","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 3, Iss 3, p 20 (2019)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/3/3/20/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography3030020","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography3030020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography3030020","pdf_url":"https://www.mdpi.com/2410-387X/3/3/20/pdf?version=1566441913","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2967823908.pdf","grobid_xml":"https://content.openalex.org/works/W2967823908.grobid-xml"},"referenced_works_count":59,"referenced_works":["https://openalex.org/W59804186","https://openalex.org/W1017518560","https://openalex.org/W1591545147","https://openalex.org/W1970157653","https://openalex.org/W1976712856","https://openalex.org/W1979211680","https://openalex.org/W1996360405","https://openalex.org/W1998690350","https://openalex.org/W2017866470","https://openalex.org/W2037325971","https://openalex.org/W2052938009","https://openalex.org/W2058867130","https://openalex.org/W2069836575","https://openalex.org/W2090334701","https://openalex.org/W2117064875","https://openalex.org/W2123923527","https://openalex.org/W2129272955","https://openalex.org/W2143772938","https://openalex.org/W2145964906","https://openalex.org/W2160205416","https://openalex.org/W2166780626","https://openalex.org/W2171595723","https://openalex.org/W2205573708","https://openalex.org/W2293470678","https://openalex.org/W2474348401","https://openalex.org/W2481033495","https://openalex.org/W2507913385","https://openalex.org/W2527934518","https://openalex.org/W2533181142","https://openalex.org/W2548743627","https://openalex.org/W2561342496","https://openalex.org/W2574928559","https://openalex.org/W2578304305","https://openalex.org/W2584560272","https://openalex.org/W2587323070","https://openalex.org/W2592836536","https://openalex.org/W2596235260","https://openalex.org/W2606010067","https://openalex.org/W2606431350","https://openalex.org/W2608118026","https://openalex.org/W2622206102","https://openalex.org/W2625720681","https://openalex.org/W2626437913","https://openalex.org/W2725057816","https://openalex.org/W2731184805","https://openalex.org/W2734374973","https://openalex.org/W2891145243","https://openalex.org/W2901392419","https://openalex.org/W2903404091","https://openalex.org/W2919782006","https://openalex.org/W2921647478","https://openalex.org/W2952508120","https://openalex.org/W2964273751","https://openalex.org/W3101291997","https://openalex.org/W4232836212","https://openalex.org/W6650105910","https://openalex.org/W6672971860","https://openalex.org/W6684832282","https://openalex.org/W6733070173"],"related_works":["https://openalex.org/W2120234551","https://openalex.org/W4231013044","https://openalex.org/W615130418","https://openalex.org/W2087333671","https://openalex.org/W2551102826","https://openalex.org/W2060145807","https://openalex.org/W1998869137","https://openalex.org/W2912135041","https://openalex.org/W4248806346","https://openalex.org/W2059457309"],"abstract_inverted_index":{"The":[0,227],"potential":[1],"benefits":[2],"of":[3,6,14,46,65,74,134,143,147,155,174,180,184,193,202,221,224,271,274],"the":[4,17,37,44,63,69,81,129,132,141,152,156,172,181,191,194,199,222,243,268],"Internet":[5],"Things":[7],"(IoT)":[8],"are":[9,26,33,160,239],"hampered":[10],"by":[11],"malicious":[12],"interventions":[13],"attackers":[15],"when":[16],"fundamental":[18],"security":[19,94,103],"requirements":[20],"such":[21,135],"as":[22],"authentication":[23,121],"and":[24,30,57,104,151,204],"authorization":[25],"not":[27],"sufficiently":[28],"met":[29],"existing":[31,85],"measures":[32],"unable":[34],"to":[35,51,80,88,127,177,190,217],"protect":[36],"IoT":[38,47,70,91,245],"environment":[39],"from":[40],"data":[41],"breaches.":[42],"With":[43],"spectrum":[45],"application":[48],"domains":[49],"increasing":[50],"include":[52],"mobile":[53],"health,":[54],"smart":[55,58],"homes":[56],"cities":[59],"in":[60,68,83,131,230],"everyday":[61],"life,":[62],"consequences":[64],"an":[66,263],"attack":[67,192],"network":[71],"connecting":[72],"billions":[73],"devices":[75],"will":[76],"become":[77],"critical.":[78],"Due":[79],"challenges":[82],"applying":[84],"cryptographic":[86,114,157],"standards":[87],"resource":[89],"constrained":[90],"devices,":[92],"new":[93],"solutions":[95,115,276],"being":[96],"proposed":[97],"come":[98],"with":[99],"a":[100,125,144,185,207,225,249],"tradeoff":[101],"between":[102],"performance.":[105],"While":[106],"much":[107],"research":[108,138],"has":[109],"focused":[110],"on":[111,171,252,256],"developing":[112],"lightweight":[113,149],"that":[116,159,187,238,265],"predominantly":[117],"adopt":[118],"RSA":[119,195],"(Rivest\u2013Shamir\u2013Adleman)":[120],"methods,":[122],"there":[123],"is":[124,248,260],"need":[126],"identify":[128],"limitations":[130],"usage":[133],"measures.":[136],"This":[137,247],"paper":[139,232],"discusses":[140],"importance":[142],"better":[145],"understanding":[146],"RSA-based":[148],"cryptography":[150],"associated":[153],"vulnerabilities":[154],"keys":[158],"generated":[161],"using":[162,262],"semi-primes.":[163],"In":[164],"this":[165,231],"paper,":[166],"we":[167],"employ":[168],"mathematical":[169],"operations":[170],"sum":[173,201],"four":[175],"squares":[176,203,275],"obtain":[178],"one":[179,220],"prime":[182],"factors":[183,223],"semi-prime":[186],"could":[188],"lead":[189],"keys.":[196],"We":[197],"consider":[198],"even":[200],"show":[205],"how":[206],"modified":[208],"binary":[209,235],"greatest":[210],"common":[211],"divisor":[212],"(GCD)":[213],"can":[214],"be":[215],"used":[216],"quickly":[218],"recover":[219],"semi-prime.":[226],"method":[228,258],"presented":[229],"only":[233],"uses":[234],"arithmetic":[236],"shifts":[237],"more":[240,277],"suitable":[241],"for":[242,267],"resource-constrained":[244],"landscape.":[246],"further":[250],"improvement":[251],"previous":[253],"work":[254],"based":[255],"Euler\u2019s":[257],"which":[259],"demonstrated":[261],"illustration":[264],"allows":[266],"faster":[269],"testing":[270],"multiple":[272],"sums":[273],"quickly.":[278]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2019-08-22T00:00:00"}
