August 1981 | NTIA Technical Report TR-81-79
William J. Hartman
Abstract: Several of the public-key cryptosystems that received considerable publicity are examined. The uses, implementation, and potential cryptoanalytic attacks are discussed. Since most of the suggested systems depend on the manipulation of large numbers, special multi precision computer programs have been developed to demonstrate system implementation and cryptoanalytic attacks. Examples of the use and timing of these programs are included.
Keywords: Public-key; number theory; cryptology; algorithms
Disclaimer: Certain commercial equipment, components, and software may be identified in this report to specify adequately the technical aspects of the reported results. In no case does such identification imply recommendation or endorsement by the National Telecommunications and Information Administration, nor does it imply that the equipment or software identified is necessarily the best available for the particular application or uses.