Small Private Key Attack Against a Family of RSA-Like Cryptosystems

被引:0
作者
Cotan, Paul [1 ,2 ]
Teseleanu, George [1 ,2 ]
机构
[1] Adv Technol Inst, 10 Dinu Vintila, Bucharest, Romania
[2] Romanian Acad, Simion Stoilow Inst Math, 21 Calea Grivitei, Bucharest, Romania
来源
SECURE IT SYSTEMS, NORDSEC 2023 | 2024年 / 14324卷
关键词
EXPOSURE ATTACKS; WIENERS ATTACK; CRYPTANALYSIS;
D O I
10.1007/978-3-031-47748-5_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Let N = pq be the product of two balanced prime numbers p and q. Elkamchouchi, Elshenawy and Shaban presented in 2002 an interesting RSA-like cryptosystem that uses the key equation ed- k(p(2) - 1)(q(2) - 1) = 1, instead of the classical RSA key equation ed - k(p - 1)(q- 1) = 1. The authors claimed that their scheme is more secure than RSA. Unfortunately, the common attacks developed against RSA can be adapted for Elkamchouchi et al.'s scheme. In this paper, we introduce a family of RSA-like encryption schemes that uses the key equation ed k(p(n) - - 1)(q(n) - 1) = 1, where n > 0 is an integer. Then, we show that regardless of the choice of n, there exists an attack based on continued fractions that recovers the secret exponent.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 33 条
[1]  
Aono Yoshinori, 2013, Information Security and Privacy. 18th Australasian Conference, ACISP 2013. Proceedings: LNCS 7959, P88, DOI 10.1007/978-3-642-39059-3_7
[2]   New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method [J].
Ariffin, Muhammad Rezal Kamel ;
Abubakar, Saidu Isah ;
Yunos, Faridah ;
Asbullah, Muhammad Asyraf .
CRYPTOGRAPHY, 2019, 3 (01) :1-25
[3]  
Blinder M, 2017, MALAYS J MATH SCI, V11, P45
[4]  
Blömer J, 2004, LECT NOTES COMPUT SC, V2947, P1
[5]  
Blömer J, 2003, LECT NOTES COMPUT SC, V2729, P27
[6]  
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[7]  
Boneh D, 1999, LECT NOTES COMPUT SC, V1592, P1
[8]  
Boneh D., 1999, NOT AM MATH SOC, V46, P203
[9]  
Bunder Martin, 2016, Information Security and Privacy. 21st Australasian Conference, ACISP 2016. Proceedings: LNCS 9723, P258, DOI 10.1007/978-3-319-40367-0_16
[10]   Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves [J].
Bunder, Martin ;
Nitaj, Abderrahmane ;
Susilo, Willy ;
Tonien, Joseph .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 :193-198