New vulnerabilities in RSA
نویسنده
چکیده
Let N = pq be the product of two large unknown primes of equal bit-size. Wiener’s famous attack on RSA shows that using a public key (N, e) satisfying ed− k(N + 1− (p+ q)) = 1 with d < 1 3 N makes RSA completely insecure. The number of such weak keys can be estimated as N 1 4−ε. In this paper, we present a generalization of Wiener’s attack. We study two new classes of exponents satisfying an equation eX − ( N − ( up± q u )) Y = Z, where X, Y are suitably small integers, u is an integer with |u| < 1 2 q and Z is a small rational. Using a combination of the continued fraction algorithm and Coppersmith’s lattice based technique for solving polynomial equations, we show that every exponent e in these classes yields the factorization of N . Moreover, we show that the number of such exponents is at least N 3 4−ε where ε > 0 is arbitrarily small for large N when p and q satisfy |p− q| = Ω (√ N ) .
منابع مشابه
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate sidechannel leakage and has a suite of utilities to analyze this. The usage of the tool, for the analysis of a cryptographic algorithm is illustrated using the standar...
متن کامل(Very) Large RSA Private Exponent Vulnerabilities
The dangers of using RSA with small private exponents has been known for more than a decade (see Wiener [7]). Knowing these dangers, but still wanting to substantially decrease decryption time, a user might try using a small negative private exponent which corresponds to a very large private exponent. We show that the attacks against small private exponent RSA by Wiener [7], Boneh & Durfee [3],...
متن کاملSoftware mitigations to hedge AES against cache-based software side channel vulnerabilities
Hardware side channel vulnerabilities have been studied for many years in embedded silicon-security arena including SmartCards, SetTop-boxes, etc. However, because various recent security activities have goals of improving the software isolation properties of PC platforms, software side channels have become a subject of interest. Recent publications discussed cache-based software side channel v...
متن کاملComparison of Symmetric and Asymmetric Cryptography With Existing Vulnerabilities and Countermeasures
Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises of brief descr...
متن کاملDid we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries
This work presents a new tool to verify the correctness of cryptographic implementations with respect to cache attacks. Our methodology discovers vulnerabilities that are hard to find with other techniques, observed as exploitable leakage. The methodology works by identifying secret dependent memory and introducing forced evictions inside potentially vulnerable code to obtain cache traces that ...
متن کامل