New Attacks on RSA with Moduli N = p r q

نویسندگان

  • Abderrahmane Nitaj
  • Tajje-eddine Rachidi
چکیده

We present three attacks on the Prime Power RSA with modulus N = pq. In the first attack, we consider a public exponent e satisfying an equation ex − φ(N)y = z where φ(N) = pr−1(p − 1)(q − 1). We show that one can factor N if the parameters |x| and |z| satisfy |xz| < N r(r−1) (r+1)2 thereby extending the recent results of Sakar [16]. In the second attack, we consider two public exponents e1 and e2 and their corresponding private exponents d1 and d2. We show that one can factor N when d1 and d2 share a suitable amount of their most significant bits, that is |d1 − d2| < N r(r−1) (r+1)2 . The third attack enables us to factor two Prime Power RSA moduli N1 = p r 1q1 and N2 = p r 2q2 when p1 and p2 share a suitable amount of their most significant bits, namely, |p1 − p2| < p1 2rq1q2 .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Attacks on the RSA Cryptosystem

This paper presents three new attacks on the RSA cryptosystem. The first two attacks work when k RSA public keys (Ni, ei) are such that there exist k relations of the shape eix−yiφ(Ni) = zi or of the shape eixi − yφ(Ni) = zi where Ni = piqi, φ(Ni) = (pi − 1)(qi − 1) and the parameters x, xi, y, yi, zi are suitably small in terms of the prime factors of the moduli. We show that our attacks enabl...

متن کامل

Secret Exponent Attacks on RSA-type Schemes with Moduli N= prq

We consider RSA-type schemes with modulus N = pq for r ≥ 2. We present two new attacks for small secret exponent d. Both approaches are applications of Coppersmith’s method for solving modular univariate polynomial equations [5]. From these new attacks we directly derive partial key exposure attacks, i.e. attacks when the secret exponent is not necessarily small but when a fraction of the secre...

متن کامل

Secret Exponent Attacks on RSA-type Schemes with Moduli N = pq

We consider RSA-type schemes with modulus N = pq for r ≥ 2. We present two new attacks for small secret exponent d. Both approaches are applications of Coppersmith’s method for solving modular univariate polynomial equations [5]. From these new attacks we directly derive partial key exposure attacks, i.e. attacks when the secret exponent is not necessarily small but when a fraction of the secre...

متن کامل

Further Attacks on Server-aided Rsa Cryptosystems

Lim and Lee 5] describe protocols for server-aided RSA digital signatures involving moduli N with special structure: N = pq where p and q are both of order N 1=2 , and p ? 1 and q ? 1 have a large common factor. We describe a method to factor such numbers in time O ? N 1=4 == and show that this renders the proposed system insecure.

متن کامل

Old and New Deterministic Factoring Algorithms

In recent years, there has been spectacular progress in the practical art of factoring. By contrast, the theoretical problem of nding deterministic algorithms which provably factor composite n has made little, if any, progress since Pollard ((Pol]) and Strassen ((Str]) showed that FFT techniques could be utilised to factor an integer n in O(n 1=4+) steps. (Here, and in similar estimates, is a p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015