This document summarizes various attacks on the RSA cryptosystem over 30 years, including:
- When p=q, the private key can be derived from the public key
- Using twin primes p and p+2 to factor the modulus
- Hastad's broadcast attack to derive the plaintext from encryptions using the same message but different public keys
- Wiener's attack and Boneh-Durfee's attack to derive the private key d when it is below a certain threshold based on the modulus n
- Common modulus attacks when encryptions use the same modulus n but different public exponents e
- Issues that can arise from reusing the prime factors p and q in different keys