When e-th Roots Become Easier Than Factoring

نویسندگان

  • Antoine Joux
  • David Naccache
  • Emmanuel Thomé
چکیده

We show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the form xi + c. Here c is fixed and xi denotes small integers of the attacker’s choosing. The attack comes in two flavors: – A first version is illustrated here by producing selective roots of the form xi + c in Ln( 1 3 , 3 q 32 9 ). This matches the special number field sieve’s (snfs) complexity. – A second variant computes arbitrary e-th roots in Ln( 1 3 , γ) after a subexponential number of oracle queries. The constant γ depends on the type of oracle used. This addresses in particular the One More rsa Inversion problem, where the e-th root oracle is not restricted to numbers of a special form. The aforementioned constant γ is then 3 q 32 9 . If the oracle is constrained to roots of the form e √ xi + c mod n then γ = 3 √ 6. Both methods are faster than factoring n using the gnfs (Ln( 1 3 , 3 q 64 9 )). This sheds additional light on rsa’s malleability in general and on rsa’s resistance to affine forgeries in particular – a problem known to be polynomial for xi > 3 √ n, but for which no algorithm faster than factoring was known before this work.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaking RSA May Be Easier Than Factoring

We provide evidence that breaking low-exponent rsa cannot be equivalent to factoring integers. We show that an algebraic reduction from factoring to breaking low-exponent rsa can be converted into an e cient factoring algorithm. Thus, in e ect an oracle for breaking rsa does not help in factoring integers. Our result suggests an explanation for the lack of progress in proving that breaking rsa ...

متن کامل

How to fake an RSA signature by encoding modular root finding as a SAT problem

Logical cryptanalysis has been introduced by Massacci and Marraro as a general framework for encoding properties of crypto-algorithms into SAT problems, with the aim of generating SAT benchmarks that are controllable and that share the properties of real-world problems and randomly generated problems. In this paper, spurred by the proposal of Cook and Mitchell to encode the factorization of lar...

متن کامل

An Approach to Hensel's Lemma

Hensel's Lemma is an important tool in many ways. One application is in factoring polynomials over Z. The computation in applying Hensel's Lemma proceeds by using the Euclidean algorithm. In this short article we present another approach to Hensel's Lemma, and we show that the lift of a polynomial can be calculated in another way. In some cases this is computationally faster. The proof is a con...

متن کامل

Factoring Polynomials over Special Finite Fields

We exhibit a deterministic algorithm for factoring polynomials in one variable over "nite "elds. It is e$cient only if a positive integer k is known for which ' k (p) is built up from small prime factors; here ' k denotes the kth cyclotomic polynomial, and p is the characteristic of the "eld. In the case k"1, when ' k (p)"p!1, such an algorithm was known, and its analysis required the generaliz...

متن کامل

On the Security of EPOC and TSH-ESIGN

We submitted a public-key encryption scheme, EPOC, and digital signature scheme, TSH-ESIGN, to IEEE P1363a. The security of EPOC and TSH-ESIGN is based on the intractability of factoring n = pq, where p and q are primes. TSH-ESIGN is also based on the intractability of the approximate e-th root (AERP) assumption, which is the approximate version of the RSA assumption. This draft describes the l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007