Science Lecture 4 Attack on RSA with Low Public Exponent Lecturer : Oded Regev Scribe :

نویسنده

  • Ishay Haviv
چکیده

The well-known RSA public key cryptosystem is nowadays used in a wide variety of applications ranging from web browsers to smart cards. Since its initial publication in 1977, many researchers have tried to look for vulnerabilities in the system. Some clever attacks have been found. However, none of the known attacks is devastating and the RSA system is still considered secure. In this lecture we present one such attack, originally due to Håstad and then greatly refined by Coppersmith. This attack can be mounted when RSA is used with a low public exponent. The attack is based on an algorithm for finding small solutions to low degree polynomials, which is in turn based on the LLL algorithm. This root finding algorithm is interesting on its own and is also used in other attacks on the RSA system. Let us describe a simple version of the RSA cryptosystem. Let N = p · q be the product of two large primes of roughly the same size. Let r, s be two integers satisfying r · s = 1 (mod φ(N)), where φ(N) = (p − 1)(q − 1) is the order of the multiplicative group ZN . We call N the RSA modulus, r the public exponent, and s the private exponent. The pair (N, r) is the public key. As its name suggests, it is public and is used to encrypt messages. The pair (N, s) is called the secret key or private key, and is known only to the recipient of encrypted messages. The secret key enables decryption of ciphertexts. A message is an integer M ∈ ZN . To encrypt M , one computes C = M r (mod N). To decrypt the ciphertext, the legitimate receiver computes Cs (mod N). Indeed, Cs = M r·s = M (mod N), where the last equality follows by Euler’s theorem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lattices in Computer Science Lecture 8 Dual Lattices Lecturer : Oded Regev Scribe : Gillat Kol

From the above definition, we have the following geometrical interpretation of the dual lattice. For any vector x, the set of all points whose inner product with x is integer forms a set of hyperplanes perpendicular to x and separated by distance 1/‖x‖. Hence, any vector x in a lattice Λ imposes the constraint that all points in Λ∗ lie in one of the hyperplanes defined by x. See the next figure...

متن کامل

Lattices in Computer Science Lecture 2 LLL Algorithm

Lattices in Computer Science Lecture 2 LLL Algorithm Lecturer: Oded Regev Scribe: Eyal Kaplan In this lecture1 we describe an approximation algorithm to the Shortest Vector Problem (SVP). This algorithm, developed in 1982 by A. K. Lenstra, H. W. Lenstra, Jr. and L. Lovasz, usually called the LLL algorithm, gives a ( 2 √ 3 ) n approximation ratio, where n is the dimension of the lattice. In many...

متن کامل

Lattices in Computer Science Lecture 1 Introduction Lecturer : Oded Regev

In this course we will consider mathematical objects known as lattices. What is a lattice? It is a set of points in n-dimensional space with a periodic structure, such as the one illustrated in Figure 1. Three dimensional lattices occur naturally in crystals, as well as in stacks of oranges. Historically, lattices were investigated since the late 18th century by mathematicians such as Lagrange,...

متن کامل

COS 598 D - Lattices scribe : Srdjan Krstic

The first two sections are largely based on the first two lectures by Oded Regev, course ”Lattices in Computer Science, Fall 2004. The third part is somewhat based on the paper by Oded Regev and Daniele Micciancio Worst-case to Average-case Reductions based on Gaussian Measures, SIAM Journal on Computing 37(1) pp. 267-302, 2007. and to a larger extent on the paper by O. Goldreich, S. Goldwasser...

متن کامل

Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures

We give three variants and improvements of Bleichenbacher’s low-exponent attack from CRYPTO 2006 on PKCS#1 v1.5 RSA signatures. For each of these three variants the fake signature representatives are accepted as valid by a flawed implementation. Our attacks work against much shorter keys as Bleichenbacher’s original attack, i.e. even for usual 1024 bit RSA keys. The first two variants can be us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005