Research Article

On the Improvement of Wiener Attack on RSA with Small Private Exponent

Table 3

The improvement between each attack.

AttacksBoundaryComplexity

Wiener Attack Polynomial time
V-T Extension Exhaustive search for and of bits (see (13))
Proposed
Improvement (Step 1)
Exhaustive search for bits (see (24))
Applying EPF (Step 2) Exhaustive search for bits (see (48))