New Attacks on RSA with Moduli N = p r q
نویسندگان
چکیده
We present three attacks on the Prime Power RSA with modulus N = pq. In the first attack, we consider a public exponent e satisfying an equation ex − φ(N)y = z where φ(N) = pr−1(p − 1)(q − 1). We show that one can factor N if the parameters |x| and |z| satisfy |xz| < N r(r−1) (r+1)2 thereby extending the recent results of Sakar [16]. In the second attack, we consider two public exponents e1 and e2 and their corresponding private exponents d1 and d2. We show that one can factor N when d1 and d2 share a suitable amount of their most significant bits, that is |d1 − d2| < N r(r−1) (r+1)2 . The third attack enables us to factor two Prime Power RSA moduli N1 = p r 1q1 and N2 = p r 2q2 when p1 and p2 share a suitable amount of their most significant bits, namely, |p1 − p2| < p1 2rq1q2 .
منابع مشابه
New Attacks on the RSA Cryptosystem
This paper presents three new attacks on the RSA cryptosystem. The first two attacks work when k RSA public keys (Ni, ei) are such that there exist k relations of the shape eix−yiφ(Ni) = zi or of the shape eixi − yφ(Ni) = zi where Ni = piqi, φ(Ni) = (pi − 1)(qi − 1) and the parameters x, xi, y, yi, zi are suitably small in terms of the prime factors of the moduli. We show that our attacks enabl...
متن کاملSecret Exponent Attacks on RSA-type Schemes with Moduli N= prq
We consider RSA-type schemes with modulus N = pq for r ≥ 2. We present two new attacks for small secret exponent d. Both approaches are applications of Coppersmith’s method for solving modular univariate polynomial equations [5]. From these new attacks we directly derive partial key exposure attacks, i.e. attacks when the secret exponent is not necessarily small but when a fraction of the secre...
متن کاملSecret Exponent Attacks on RSA-type Schemes with Moduli N = pq
We consider RSA-type schemes with modulus N = pq for r ≥ 2. We present two new attacks for small secret exponent d. Both approaches are applications of Coppersmith’s method for solving modular univariate polynomial equations [5]. From these new attacks we directly derive partial key exposure attacks, i.e. attacks when the secret exponent is not necessarily small but when a fraction of the secre...
متن کاملFurther Attacks on Server-aided Rsa Cryptosystems
Lim and Lee 5] describe protocols for server-aided RSA digital signatures involving moduli N with special structure: N = pq where p and q are both of order N 1=2 , and p ? 1 and q ? 1 have a large common factor. We describe a method to factor such numbers in time O ? N 1=4 == and show that this renders the proposed system insecure.
متن کاملOld and New Deterministic Factoring Algorithms
In recent years, there has been spectacular progress in the practical art of factoring. By contrast, the theoretical problem of nding deterministic algorithms which provably factor composite n has made little, if any, progress since Pollard ((Pol]) and Strassen ((Str]) showed that FFT techniques could be utilised to factor an integer n in O(n 1=4+) steps. (Here, and in similar estimates, is a p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015