New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method

被引:13
作者
Ariffin, Muhammad Rezal Kamel [1 ,2 ]
Abubakar, Saidu Isah [1 ]
Yunos, Faridah [1 ,2 ]
Asbullah, Muhammad Asyraf [1 ,3 ]
机构
[1] Univ Putra Malaysia, Inst Math Res, Al Kindi Cryptog Res Lab, Serdang 43400, Selangor, Malaysia
[2] Univ Putra Malaysia, Fac Sci, Dept Math, Serdang 43400, Selangor, Malaysia
[3] Univ Putra Malaysia, Ctr Fdn Studies Agr Sci, Serdang 43400, Selangor, Malaysia
关键词
RSA modulus; primes difference; cryptanalysis; short decryption exponent; attacks; continued fraction;
D O I
10.3390/cryptography3010002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = pq in polynomial time. The paper has two parts. In the first part, we report the usage of the small prime difference method of the form vertical bar b(2)p - a(2)q vertical bar < N-gamma where the ratio of q/p is close to b(2)/a(2), which yields a bound d < root 3/root 2N(3/4-gamma) from the convergents of the continued fraction expansion of e/N - [a(2)+b(2/)ab root N]+1. The second part of the paper reports four cryptanalytic attacks on t instances of RSA moduli N-s = p(s)q(s) for s = 1, 2, ... , t where we use N - [a(2) + b(2/)ab root N] + 1 as an approximation of phi(N) satisfying generalized key equations of the shape e(s)d - k(s)phi(N-s) = 1, e(s)d(s) - k phi(N-s) = 1, e(s)d - k(s)phi(N-s) = z(s), and e(s)d(s) - k phi(N-s) = z(s) for unknown positive integers d, k(s), d(s), k(s), and z(s), where we establish that t RSA moduli can be simultaneously factored in polynomial time using combinations of simultaneous Diophantine approximations and lattice basis reduction methods. In all the reported attacks, we have found an improved short secret exponent bound, which is considered to be better than some bounds as reported in the literature.
引用
收藏
页码:1 / 25
页数:25
相关论文
共 15 条
  • [1] Asbullah M. A., 2015, THESIS
  • [2] SUMS OF DIVISORS, PERFECT NUMBERS AND FACTORING
    BACH, E
    MILLER, G
    SHALLIT, J
    [J]. SIAM JOURNAL ON COMPUTING, 1986, 15 (04) : 1143 - 1154
  • [3] Blömer J, 2004, LECT NOTES COMPUT SC, V2947, P1
  • [4] Cryptanalysis of RSA with private key d less than N0.292
    Boneh, D
    Durfee, G
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1339 - 1349
  • [5] A Generalization of de Weger's Method
    Chen, Chien-Yuan
    Hsueh, Chih-Cheng
    Lin, Yu-Feng
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 344 - +
  • [6] Cryptanalysis of RSA with small prime difference
    de Weger, B
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2002, 13 (01) : 17 - 28
  • [7] Dubey MK., 2014, InProceedings of the third international conference on soft computing for problem solving: SocProS 2013, P805, DOI [10.1007/978-81-322-1771-8_70, DOI 10.1007/978-81-322-1771-8_70]
  • [8] Hinek M., 2009, Cryptography and Network Security Series
  • [9] FACTORING POLYNOMIALS WITH RATIONAL COEFFICIENTS
    LENSTRA, AK
    LENSTRA, HW
    LOVASZ, L
    [J]. MATHEMATISCHE ANNALEN, 1982, 261 (04) : 515 - 534
  • [10] Maitra S., 2008, RSA INT C INF SEC, P228