Practical attacks on small private exponent RSA: new records and new insights

被引:1
作者
Li, Qiang [1 ]
Zheng, Qun-xiong [1 ]
Qi, Wen-feng [1 ]
机构
[1] Informat Engn Univ, 62 Kexue Rd, Zhengzhou 450001, Peoples R China
关键词
Practical attack; Small private exponent attack; MSBs guess; Multivalued-continuous phenomena; Binary search; SMALL ROOT; CRYPTANALYSIS; LINEARIZATION; EQUATIONS; BITS;
D O I
10.1007/s10623-023-01295-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a typical representative of the public key cryptosystem, RSA has attracted a great deal of cryptanalysis since its invention, among which a famous attack is the small private exponent attack. It is well-known that the best theoretical upper bound for the private exponent d that can be attacked is d <= N-0.292, where N is a RSA modulus. However, this bound may not be achieved in practical attacks since the lattice constructed by Coppersmith method may have a large enough dimension and the lattice-based reduction algorithms cannot work so well in both efficiency and quality. In this paper, we propose a new practical attack based on the binary search for the most significant bits (MSBs) of prime divisors of N and the Herrmann-May's attack in 2010. The idea of binary search is inspired by the discovery of phenomena called "multivalued-continuous phenomena", which can significantly accelerate our attack. Together with several carefully selected parameters according to our exact and effective numerical estimations, we can improve the upper bound of d that can be practically achieved. More specifically, without the binary search method, we successfully attack RSA with a 1024-bit-modulus N when d <= N-0.285. Moreover, by our new method, we can implement a successful attack for a 1024-bit-modulus RSA when d = N-0.292 and for a 2048-bit-modulus RSA when d <= N-0.287 in about a month. We believe our method can provide some inspiration to practical attacks on RSA with mainstream-size moduli.
引用
收藏
页码:4107 / 4142
页数:36
相关论文
共 33 条
[1]  
Blinder M, 2017, MALAYS J MATH SCI, V11, P45
[2]  
Blömer J, 2004, LECT NOTES COMPUT SC, V2947, P1
[3]  
Blömer J, 2001, LECT NOTES COMPUT SC, V2146, P4
[4]  
Boneh D, 1999, LECT NOTES COMPUT SC, V1592, P1
[5]   Cryptanalysis of RSA with private key d less than N0.292 [J].
Boneh, D ;
Durfee, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1339-1349
[6]   Small solutions to polynomial equations, and low exponent RSA vulnerabilities [J].
Coppersmith, D .
JOURNAL OF CRYPTOLOGY, 1997, 10 (04) :233-260
[7]  
Coppersmith D, 1996, LECT NOTES COMPUT SC, V1070, P178
[8]  
Coppersmith D, 1996, LECT NOTES COMPUT SC, V1070, P155
[9]   Cryptanalysis of RSA with small prime difference [J].
de Weger, B .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2002, 13 (01) :17-28
[10]  
Durfee G., 2002, THESIS STANFORD U ST