Further cryptanalysis of some variants of the RSA cryptosystemFurther cryptanalysis of some variants of the RSA cryptosystemM. Rahmani et al.

被引:0
作者
Mohammed Rahmani [1 ]
Abderrahmane Nitaj [2 ]
Mhammed Ziane [1 ]
机构
[1] Mohammed First University,Sciences Faculty, Department of Mathematics and Computer Science, ACSA Laboratory
[2] Normandie Univ,undefined
[3] UNICAEN,undefined
[4] CNRS,undefined
[5] LMNO,undefined
关键词
RSA; Factorization; Coppersmith’s method; Lattice basis reduction; RSA Variants; 94A60;
D O I
10.1007/s12190-024-02292-0
中图分类号
学科分类号
摘要
To improve the security and the efficiency of the RSA cryptosystem, several variants have been proposed such as CRT-RSA, KMOV, Multiprime-RSA, Takagi-RSA, and Multiprime-power-RSA. Some variants use an RSA modulus N=pq\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$N=pq$$\end{document} with a public exponent e and a private exponent d satisfying ed≡1(modp2-1q2-1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ed\equiv 1\pmod {\left( p^2-1\right) \left( q^2-1\right) }$$\end{document} or ed≡1(modp2+p+1q2+q+1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ed\equiv 1\pmod {\left( p^2+p+1\right) \left( q^2+q+1\right) }$$\end{document}. In these variants, e is in the form e≡1d(modp2-1q2-1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$e\equiv \frac{1}{d}\pmod {\left( p^2-1\right) \left( q^2-1\right) }$$\end{document} or e≡1d(modp2+p+1q2+q+1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$e\equiv \frac{1}{d}\pmod {\left( p^2+p+1\right) \left( q^2+q+1\right) }$$\end{document} with a small d. In this paper, we present a new attack on the former variants whenever the public exponent e has the form e≡zu(modp2-1q2-1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$e\equiv \frac{z}{u}\pmod {\left( p^2-1\right) \left( q^2-1\right) }$$\end{document} or the form e≡zu(modp2+p+1q2+q+1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$e\equiv \frac{z}{u}\pmod {\left( p^2+p+1\right) \left( q^2+q+1\right) }$$\end{document} with small |z| and u. As a consequence, our class of weak exponents is much larger than the class in the former attacks. Our new method is based on Coppersmith’s method and lattice basis reduction, and breaks the variants in polynomial time when u and |z| are suitably small. Moreover, our method retrieves all the results of the former known attacks on such variants.
引用
收藏
页码:1911 / 1941
页数:30
相关论文
empty
未找到相关数据