Efficient CRT-RSA Decryption for Small Encryption Exponents

被引:0
作者
Maitra, Subhamoy [1 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS | 2010年 / 5985卷
关键词
RSA; CRT-RSA; Key Generation; Efficient Decryption; Primes; Exponents; KEY EXPOSURE ATTACKS; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Consider CRT-RSA with the parameters p,q,e, d(p), d(q), where p,g are secret primes, e is the public encryption exponent and d(p), d(q) are the private decryption exponents. We present an efficient method to select CRT-RSA parameters in such a manner so that the decryption becomes faster for small encryption exponents. This is the most frequently used situation for application of RSA in commercial domain. Our idea is to choose e and the factors (with low Hamming weight) of d(p), d(q) first and then applying the extended Euclidean algorithm, we obtain p, q of same bit size. For small e, we get an asymptotic reduction of the order of 1/3 in the decryption time compared to standard CRT-RSA parameters for large N = pq. In case of practical parameters, with 1024 bits N and e = 2(16) + 1, we achieve a reduction of more than 27%. Extensive security analysis is presented for our selected parameters and benchmark examples are also provided.
引用
收藏
页码:26 / 40
页数:15
相关论文
共 50 条
[21]   Small CRT-Exponent RSA Revisited [J].
Takayasu, Atsushi ;
Lu, Yao ;
Peng, Liqiang .
JOURNAL OF CRYPTOLOGY, 2019, 32 (04) :1337-1382
[22]   Small CRT-Exponent RSA Revisited [J].
Takayasu, Atsushi ;
Lu, Yao ;
Peng, Liqiang .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 :130-159
[23]   Wagner's attack on a secure CRT-RSA algorithm reconsidered [J].
Bloemer, Johannes ;
Otto, Martin .
FAULT DIAGNOISIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 :13-23
[24]   Cryptanalysis of RSA with Multiple Small Secret Exponents [J].
Takayasu, Atsushi ;
Kunihiro, Noboru .
INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 :176-191
[25]   RSA Encryption/Decryption Implementation Based on Zedboard [J].
Bai, Xu ;
Jiang, Lei ;
Liu, Xinxing ;
Tan, Jianlong .
TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 :114-121
[26]   Multi-factor Rebalanced RSA-CRT Encryption Schemes [J].
Ou, Huayin ;
Wei, Baodian .
PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, :1986-1990
[27]   CRT-RSA的连分数算法攻击的分析 [J].
童子圣 ;
孙强 .
微计算机信息, 2009, 25 (09) :70-71
[28]   On Deterministic Polynomial-time Equivalence of Computing the CRT-RSA Secret Keys and Factoring [J].
Maitra, Subhamoy ;
Sarkar, Santanu .
DEFENCE SCIENCE JOURNAL, 2012, 62 (02) :122-126
[29]   Revisiting the Polynomial-Time Equivalence of Computing the CRT-RSA Secret Key and Factoring [J].
Zheng, Mengce .
MATHEMATICS, 2022, 10 (13)
[30]   Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? [J].
Barbu, Guillaume ;
Battistello, Alberto ;
Dabosville, Guillaume ;
Giraud, Christophe ;
Renault, Guenael ;
Renner, Soline ;
Zeitoun, Rina .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 :198-215