The Attack of the RSA Subgroup Assumption

被引:0
|
作者
Weng, Jiang [1 ,2 ]
Dou, Yun-Qi [1 ,2 ]
Ma, Chuan-Gui [1 ,2 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
RSA moduli; hidden order; subgroup; cryptanalysis; semi-smooth RSA; INTERPOLATION; COMPUTATION; EFFICIENT; TRANSFORM; POINTS; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In TCC 2005, Groth proposed the cryptographic usefulness of a small subgroup G of Z(N)*. of hidden order. So far, the best attack of previous method for a subgroup of Z(N)* had a complexity about O(root p'). In this paper, we propose the interval and the double walks method to speed up the computation of the semi-smooth RSA subgroup problem. Our new algorithm reduces the complexity to O(root p'/2) rather than O(root p'). Besides the theoretical analysis, we also compare the performances of our new algorithm with the previous algorithm in experiments, and the efficiency of our new algorithm is approach to 50% faster than the previous.
引用
收藏
页码:597 / 610
页数:14
相关论文
共 50 条
  • [41] On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method
    Ruzai, Wan Nur Aqlili
    Ariffin, Muhammad Rezal Kamel
    Asbullah, Muhammad Asyraf
    Mahad, Zahari
    Nawawi, Athirah
    IEEE ACCESS, 2020, 8 (08): : 80997 - 81006
  • [42] Mathematical Attack of RSA by Extending the Sum of Squares of Primes to Factorize a Semi-Prime
    Overmars, Anthony
    Venkatraman, Sitalakshmi
    MATHEMATICAL AND COMPUTATIONAL APPLICATIONS, 2020, 25 (04)
  • [43] New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method
    Ariffin, Muhammad Rezal Kamel
    Abubakar, Saidu Isah
    Yunos, Faridah
    Asbullah, Muhammad Asyraf
    CRYPTOGRAPHY, 2019, 3 (01) : 1 - 25
  • [44] A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations
    Susilo, Willy
    Tonien, Joseph
    THEORETICAL COMPUTER SCIENCE, 2021, 885 : 125 - 130
  • [45] Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
    Sarkar, Santanu
    Maitra, Subhamoy
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 476 - 493
  • [46] A polynomial time attack on RSA with private CRT-Exponents smaller than N0.073
    Jochemsz, Ellen
    May, Alexander
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 395 - +
  • [47] Multiparty Generation of an RSA Modulus
    Chen, Megan
    Doerner, Jack
    Kondi, Yashvanth
    Lee, Eysa
    Rosefield, Schuyler
    Shelat, Abhi
    Cohen, Ran
    JOURNAL OF CRYPTOLOGY, 2022, 35 (02)
  • [48] Fast Cryptanalysis of RSA Encrypted Data using A Combination of Mathematical and Brute Force Attack in Distributed Computing Environment
    Shende, Vikrant
    Sudi, Giridhar
    Kulkarni, Meghana
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 2446 - 2449
  • [49] Certificateless Proxy Signature from RSA
    Deng, Lunzhi
    Zeng, Jiwen
    Qu, Yunyun
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [50] Simple Backdoors on RSA Modulus by Using RSA Vulnerability
    Sun, Hung-Min
    Wu, Mu-En
    Yang, Cheng-Ta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (09): : 2326 - 2332