Classical Attacks on a Variant of the RSA Cryptosystem

نویسندگان

چکیده

Let \(N=pq\) be an RSA modulus with balanced prime factors. In 2018, Murru and Saettone presented a variant of the cryptosystem based on cubic Pell equation in which public key (N, e) private d) satisfy \(ed\equiv 1\pmod {\left( p^2+p+1\right) \left( q^2+q+1\right) }\). They claimed that classical small attacks such as Wiener’s continued fraction attack do not apply to their scheme. this paper, we show that, contrary, method well inverse problem technique Boneh Durfee can applied More precisely, proposed broken if \(d<N^{0.5694}\). This shows scheme is reality more vulnerable than RSA, where bound vulnerability \(d<N^{0.292}\).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mathematical Attacks on RSA Cryptosystem

In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area...

متن کامل

New Attacks on the RSA Cryptosystem

This paper presents three new attacks on the RSA cryptosystem. The first two attacks work when k RSA public keys (Ni, ei) are such that there exist k relations of the shape eix−yiφ(Ni) = zi or of the shape eixi − yφ(Ni) = zi where Ni = piqi, φ(Ni) = (pi − 1)(qi − 1) and the parameters x, xi, y, yi, zi are suitably small in terms of the prime factors of the moduli. We show that our attacks enabl...

متن کامل

Some Insightful Attacks on the RSA Cryptosystem

RSA has come to play a central role in electronic communications. As the first example of what is known as a public key cryptosystem, and the only one that has stood the test of nearly 30 years of attacks, RSA has become the algorithm of choice for encrypting Internet credit-card transactions, securing email, and authenticating phone calls. Like all practical cryptographic schemes, however, RSA...

متن کامل

An efficient variant of the RSA cryptosystem

We describe an efficient combination of two variants of the RSA cryptosystem (MPrime and Rebalanced RSA) analyzed by Boneh and Shacham [Boneh and Shacham 2002]. For 2048-bit moduli, the resulting decryption process is about 8 times faster than that presented by Quisquater and Couvreur [Quisquater and Couvreur 1982] and about 27 times faster than the original cryptosystem. Resumo. Descrevemos um...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-88238-9_8