A New LSB Attack on Special-Structured RSA Primes

被引:3
作者
Abd Ghafar, Amir Hamzah [1 ]
Ariffin, Muhammad Rezal Kamel [1 ,2 ]
Asbullah, Muhammad Asyraf [1 ,3 ]
机构
[1] Univ Putra Malaysia, Inst Math Res, Serdang 43400, Selangor Darul, Malaysia
[2] Univ Putra Malaysia, Fac Sci, Dept Math, Serdang 43400, Selangor Darul, Malaysia
[3] Univ Putra Malaysia, Ctr Fdn Studies Agr Sci, Serdang 43400, Selangor Darul, Malaysia
来源
SYMMETRY-BASEL | 2020年 / 12卷 / 05期
关键词
cryptography; RSA cryptosystem; RSA cryptanalysis; partial key exposure attack;
D O I
10.3390/sym12050838
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest-Shamir-Adleman (RSA) cryptosystem is highly regarded as one of the most deployed public-key cryptosystem today. Previous attacks on the cryptosystem focus on the effort to weaken the hardness of integer factorization problem, embedded in the RSA modulus, N=pq. The adversary used several assumptions to enable the attacks. For examples, p and q which satisfy Pollard's weak primes structures and partial knowledge of least significant bits (LSBs) of p and q can cause N to be factored in polynomial time, thus breaking the security of RSA. In this paper, we heavily utilized both assumptions. First, we assume that p and q satisfy specific structures where p=am+rp and q=bm+rq for a,b are positive integers and m is a positive even number. Second, we assume that the bits of rp and rq are the known LSBs of p and q respectively. In our analysis, we have successfully factored N in polynomial time using both assumptions. We also counted the number of primes that are affected by our attack. Based on the result, it may poses a great danger to the users of RSA if no countermeasure being developed to resist our attack.
引用
收藏
页数:13
相关论文
共 18 条
[1]  
Barker Elaine, 2016, NIST SPECIAL PUBLICA, V800-57, DOI 10.6028/NIST.SP.800-57pt3r1
[2]  
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[3]  
Buhler JP., 1993, The development of the number field sieve, pp. 50, DOI DOI 10.1007/BFB0091539.MR1321221
[4]   Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor [J].
Cho, Jonghyeon ;
Kim, Taehun ;
Kim, Soojin ;
Im, Miok ;
Kim, Taehyun ;
Shin, Youngjoo .
APPLIED SCIENCES-BASEL, 2020, 10 (03)
[5]  
Coppersmith D, 1996, LECT NOTES COMPUT SC, V1070, P178
[6]  
Genkin D, 2014, LECT NOTES COMPUT SC, V8616, P444, DOI 10.1007/978-3-662-44371-2_25
[7]  
Ghafar AHA, 2019, MALAYS J MATH SCI, V13, P111
[8]  
Ghafar A H A, 2018, P 6 INT CRYPT INF SE, P103
[9]  
Heninger N, 2009, LECT NOTES COMPUT SC, V5677, P1, DOI 10.1007/978-3-642-03356-8_1
[10]  
Herrmann M, 2008, LECT NOTES COMPUT SC, V5350, P406, DOI 10.1007/978-3-540-89255-7_25