Common modulus attacks on small private exponent RSA and some fast variants (in practice)

被引:1
作者
Hinek, M. Jason [1 ]
Lam, Charles C. Y. [2 ]
机构
[1] Univ Calgary, Dept Comp Sci, iCORE Informat Secur Lab, Calgary, AB T2N 1N4, Canada
[2] Calif State Univ, Dept Math, Bakersfield, CA 93311 USA
关键词
RSA; common modulus; multi-prime RSA; Takagi's scheme; small private exponent; lattice reduction; continued fractions;
D O I
10.1515/JMC.2010.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work we re-examine two common modulus attacks on RSA. First, we show that Guo's continued fraction attack works much better in practice than previously expected. Given three instances of RSA with a common modulus N and private exponents each smaller than N 33, the attack can factor the modulus about 93% of the time in practice. The success rate of the attack can be increased up to almost 100% by including a relatively small exhaustive search. Next, we consider F-Iowgrave-Graham and Seifert's lattice -based attack and show that a second necessary condition for the attack exists that limits the hounds (beyond the original bounds) once n >= 7 instances of RSA are used. In particular, by construction, the attack is limited to private exponents at most N0.5-is an element of, given sufficiently many instances, instead of the original bound of N1-is an element of. In addition, we also consider the effectiveness of the attacks when mounted against multi-prime RSA and Takagi's variant of RSA. For multi-prime RSA, we show three (or more) instances with a common modulus and private exponents smaller than N1/3-is an element of is unsafe. For Takagi's scheme, we show that three or more instances with a common modulus N = p(t)q is unsafe when all the private exponents are smaller than N2/(3(t+1))-is an element of. The results, for both variants, is obtained using Guo's method and are almost always successful with the inclusion of a small exhaustive search. When only two instances are available, Howgrave-Graham and Seifert's attack can be successfully mounted on multi prime RSA, with r primes in the modulus, when the private exponents are both smaller than N (3 +r)/7r-is an element of.
引用
收藏
页码:57 / 93
页数:37
相关论文
共 24 条
[1]   Cryptanalysis of RSA with private key d less than N0.292 [J].
Boneh, D ;
Durfee, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1339-1349
[2]  
Boneh D., 1999, NOT AM MATH SOC, V46, P203
[3]  
Ciet M., 2004, UCL CRYPTO GROUP TEC
[4]   Deterministic polynomial-time equivalence of computing the RSA secret key and factoring [J].
Coron, Jean-Sebastien ;
May, Alexander .
JOURNAL OF CRYPTOLOGY, 2007, 20 (01) :39-50
[5]  
DeLaurentis J.M., 1984, CRYPTOLOGIA, P253
[6]  
Ferguson N., 2003, PRACTICAL CRYPTOGRAP
[7]   On the security of multi-prime RSA [J].
Hinek, M. Jason .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2008, 2 (02) :117-147
[8]  
Hinek MJ, 2003, LECT NOTES COMPUT SC, V2595, P385
[9]  
Howgrave-Graham N., 1999, Secure Networking - CQRE [Secure]'99. International Exhibition and Congress. Proceedings (Lecture Notes in Computer Science Vol.1740), P153
[10]  
Itoh K, 2008, LECT NOTES COMPUT SC, V4964, P387, DOI 10.1007/978-3-540-79263-5_25