The Wiener Attack on RSA Revisited: A Quest for the Exact Bound

被引:7
作者
Susilo, Willy [1 ]
Tonien, Joseph [1 ]
Yang, Guomin [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2019 | 2019年 / 11547卷
关键词
RSA; Continued fractions; Wiener technique; Small secret exponent; CRYPTANALYSIS;
D O I
10.1007/978-3-030-21548-4_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Wiener pointed out that the RSA can be broken if the private exponent d is relatively small compared to the modulus N (using the continued fraction technique), it has been a general belief that the Wiener attack works for d < N-1/4. On the contrary, in this work, we give an example where the Wiener attack fails with d = left perpendicular1/2 N(1/4)right perpendicular + 1, thus, showing that the bound d < N-1/4 is not accurate as it has been thought of. By using the classical Legendre Theorem on continued fractions, in 1999 Boneh provided the first rigorous proof which showed that the Wiener attack works for d < 1/3N(1/4). However, the question remains whether 1/3N(1/4) is the best bound for the Wiener attack. Additionally, the question whether another rigorous proof for a better bound exists remains an elusive research problem. In this paper, we attempt to answer the aforementioned problems by improving Boneh's bound after the two decades of research. By a new proof, we show that the Wiener continued fraction technique works for a wider range, namely, for d <= 1/4 root 18N(1/4) = 1/2.06 ... N-1/4. Our new analysis is supported by an experimental result where it is shown that the Wiener attack can successfully perform the factorization on the RSA modulus N and determine a private key d where d = left perpendicular1/4 root 18N(1/4)right perpendicular.
引用
收藏
页码:381 / 398
页数:18
相关论文
共 20 条
  • [1] [Anonymous], 2006, An introduction to the theory of numbers
  • [2] Bleichenbacher D, 2006, LECT NOTES COMPUT SC, V3958, P1
  • [3] Blinder M, 2017, MALAYS J MATH SCI, V11, P45
  • [4] Blömer J, 2004, LECT NOTES COMPUT SC, V2947, P1
  • [5] Cryptanalysis of RSA with private key d less than N0.292
    Boneh, D
    Durfee, G
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1339 - 1349
  • [6] Boneh Dan, 1999, Notices of the AMS, V46, P203
  • [7] Bunder Martin, 2016, Information Security and Privacy. 21st Australasian Conference, ACISP 2016. Proceedings: LNCS 9723, P258, DOI 10.1007/978-3-319-40367-0_16
  • [8] Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves
    Bunder, Martin
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 193 - 198
  • [9] A generalized attack on RSA type cryptosystems
    Bunder, Martin
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    [J]. THEORETICAL COMPUTER SCIENCE, 2017, 704 : 74 - 81
  • [10] Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    Coppersmith, D
    [J]. JOURNAL OF CRYPTOLOGY, 1997, 10 (04) : 233 - 260