A new related message attack on RSA

被引:0
|
作者
Yacobi, O
Yacobi, Y
机构
[1] Univ Calif San Diego, Dept Math, La Jolla, CA 92093 USA
[2] Microsoft Res, Redmond, WA 98052 USA
来源
THEORETICAL COMPUTER SCIENCE | 2006年 / 3895卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms x(e) mod N and (ax+b)(e) mod N for known constants a, b is an element of Z(N), one can usually compute x in O(e log(2) e) Z(N)-operations (there axe O(e(2)) messages for which the method fails). We show that given e cryptograms c(i)equivalent to(a(i)x+b(i))(e) mod N, i=0, 1,...e-1, for any known constants a(i), b(i) is an element of Z(N), one can deterministically compute x in O(e) Z(N)-operations that depend on the cryptograms, after a pre-processing that depends only on the constants. The complexity of the pre-processing is O(e log(2) e) Z(N)-operations, and can be amortized over many instances. We also consider a special case where the overall cost of the attack is O(e) Z(N)-operations. Our tools are borrowed from numerical-analysis and adapted to handle formal polynomials over finite-rings. To the best of our knowledge their use in cryptanalysis is novel.
引用
收藏
页码:187 / 195
页数:9
相关论文
共 50 条
  • [41] Permanent fault attack on the parameters of RSA with CRT
    Yen, SM
    Moon, S
    Ha, J
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 285 - 296
  • [42] RSA-padding signatures with attack studies
    Stephanides, George
    Constantinescu, Nicolae
    Cosulschi, Mirel
    Gabroveanu, Mihai
    WEBIST 2006: Proceedings of the Second International Conference on Web Information Systems and Technologies: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 97 - 100
  • [43] Perturbating RSA public keys: An improved attack
    Berzati, Alexandre
    Canovas, Cecile
    Goubin, Louis
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 380 - +
  • [44] On an attack on RSA with small CRT-exponents
    Han LiDong
    Wang XiaoYun
    Xu GuangWu
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (08) : 1511 - 1518
  • [45] Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
    Berson, TA
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 213 - 220
  • [46] A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based
    Kaedi, S.
    Doostari, M. A.
    Ghaznavi-Ghoushchi, M. B.
    Yusefi, H.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (03)
  • [47] New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method
    Ariffin, Muhammad Rezal Kamel
    Abubakar, Saidu Isah
    Yunos, Faridah
    Asbullah, Muhammad Asyraf
    CRYPTOGRAPHY, 2019, 3 (01) : 1 - 25
  • [48] Message Blinding Method Requiring No Multiplicative Inversion for RSA
    Kim, Heeseok
    Han, Dong-Guk
    Hong, Seokhie
    Ha, Jaecheol
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2014, 13 (04)
  • [49] The Wiener Attack on RSA Revisited: A Quest for the Exact Bound
    Susilo, Willy
    Tonien, Joseph
    Yang, Guomin
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 381 - 398
  • [50] Cryptographic Implementation of RSA for Ion Fault Injection Attack
    Shao, Cuiping
    Li, Huiyun
    Zhang, Xiaolong
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,