The Attack of the RSA Subgroup Assumption

被引:0
|
作者
Weng, Jiang [1 ,2 ]
Dou, Yun-Qi [1 ,2 ]
Ma, Chuan-Gui [1 ,2 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
RSA moduli; hidden order; subgroup; cryptanalysis; semi-smooth RSA; INTERPOLATION; COMPUTATION; EFFICIENT; TRANSFORM; POINTS; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In TCC 2005, Groth proposed the cryptographic usefulness of a small subgroup G of Z(N)*. of hidden order. So far, the best attack of previous method for a subgroup of Z(N)* had a complexity about O(root p'). In this paper, we propose the interval and the double walks method to speed up the computation of the semi-smooth RSA subgroup problem. Our new algorithm reduces the complexity to O(root p'/2) rather than O(root p'). Besides the theoretical analysis, we also compare the performances of our new algorithm with the previous algorithm in experiments, and the efficiency of our new algorithm is approach to 50% faster than the previous.
引用
收藏
页码:597 / 610
页数:14
相关论文
共 50 条
  • [31] Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
    Sarkar, Santanu
    Sen Gupta, Sourav
    Maitra, Subhamoy
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 2 - 16
  • [32] Small Secret-Key Attack on a Takagi's Variant of RSA
    Itoh, Kouichi
    Kunihiro, Noboru
    Kurosawa, Kaoru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01): : 33 - 41
  • [33] Exponential increment of RSA attack range via lattice based cryptanalysis
    Abderahmanne Nitaj
    Muhammad Rezal Kamel Ariffin
    Nurul Nur Hanisah Adenan
    Domenica Stefania Merenda
    Ali Ahmadian
    Multimedia Tools and Applications, 2022, 81 : 36607 - 36622
  • [34] Exponential increment of RSA attack range via lattice based cryptanalysis
    Nitaj, Abderahmanne
    Ariffin, Muhammad Rezal Kamel
    Adenan, Nurul Nur Hanisah
    Merenda, Domenica Stefania
    Ahmadian, Ali
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (25) : 36607 - 36622
  • [35] Small Private Key Attack Against a Family of RSA-Like Cryptosystems
    Cotan, Paul
    Teseleanu, George
    SECURE IT SYSTEMS, NORDSEC 2023, 2024, 14324 : 57 - 72
  • [36] A partial key exposure attack on RSA using a 2-dimensional lattice
    Jochemsz, Ellen
    de Weger, Berme
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 203 - 216
  • [37] Partial Key Exposure Attack on Short Secret Exponent CRT-RSA
    May, Alexander
    Nowakowski, Julian
    Sarkar, Santanu
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 99 - 129
  • [38] Partial Key Attack Given MSBs of CRT-RSA Private Keys
    Abd Ghafar, Amir Hamzah
    Ariffin, Muhammad Rezal Kamel
    Yasin, Sharifah Md
    Sapar, Siti Hasana
    MATHEMATICS, 2020, 8 (12) : 1 - 20
  • [39] The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli
    Nemec, Matus
    Sys, Marek
    Svenda, Petr
    Klinec, Dusan
    Matyas, Vashek
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1631 - 1648
  • [40] Partial key exposure attack on RSA using some private key blocks
    Ravva, Santosh Kumar
    Prakash, K. L. N. C.
    Krishna, S. R. M.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 185 - 193