ABSTRACT

In this chapter, we illustrate the potential dangers of using a small public exponent. All of the attacks assume some knowledge of the plaintexts being encrypted and only recover the plaintext. None of the attacks can recover the private exponent or factor the modulus.