A generalized attack on RSA type cryptosystems

被引:24
作者
Bunder, Martin [1 ]
Nitaj, Abderrahmane [2 ]
Susilo, Willy [3 ]
Tonien, Joseph [3 ]
机构
[1] Univ Wollongong, Sch Math & Appl Stat, Wollongong, NSW, Australia
[2] Univ Caen Normandie, Lab Math Nicolas Oresme, Caen, France
[3] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
关键词
RSA; Elliptic curves; Continued fractions; Coppersmith's technique; EQUATIONS;
D O I
10.1016/j.tcs.2017.09.009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Let N = pq be an RSA modulus with unknown factorization. Some variants of the RSA cryptosystem, such as LUC, RSA with Gaussian primes and RSA type schemes based on singular elliptic curves use a public key e and a private key d satisfying an equation of the form ed - k(p(2)-1)(q(2)-1) = 1. In this paper, we consider the general equation ex - (p(2)-1)(q(2)-1)y =z and present a new attack that finds the prime factors p and q in the case that x, y and z satisfy a specific condition. The attack combines the continued fraction algorithm and Coppersmith's technique and can be seen as a generalization of the attacks of Wiener and Blomer-May on RSA. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:74 / 81
页数:8
相关论文
共 19 条
[1]  
Boneh D, 1999, LECT NOTES COMPUT SC, V1592, P1
[2]  
BONEH D., 2002, CRYPTOBYTES, V5, P1
[3]  
Boneh D., 1999, NOT AM MATH SOC, V46, P203
[4]  
Bunder Martin, 2016, Information Security and Privacy. 21st Australasian Conference, ACISP 2016. Proceedings: LNCS 9723, P258, DOI 10.1007/978-3-319-40367-0_16
[5]   An efficient probabilistic public-key cryptosystern over quadratic fields quotients [J].
Castagnos, Guilhem .
FINITE FIELDS AND THEIR APPLICATIONS, 2007, 13 (03) :563-576
[6]   Small solutions to polynomial equations, and low exponent RSA vulnerabilities [J].
Coppersmith, D .
JOURNAL OF CRYPTOLOGY, 1997, 10 (04) :233-260
[7]  
Elkamchouchi H, 2002, ICCS 2002: 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, P91, DOI 10.1109/ICCS.2002.1182444
[8]  
Hardy G.H., 1965, An Introduction to the Theory of Numbers, VFourth
[9]   SOLVING SIMULTANEOUS MODULAR EQUATIONS OF LOW DEGREE [J].
HASTAD, J .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :336-341
[10]  
Hinek M., 2009, Cryptography and Network Security Series