Efficient CRT-RSA Decryption for Small Encryption Exponents

被引:0
作者
Maitra, Subhamoy [1 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS | 2010年 / 5985卷
关键词
RSA; CRT-RSA; Key Generation; Efficient Decryption; Primes; Exponents; KEY EXPOSURE ATTACKS; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Consider CRT-RSA with the parameters p,q,e, d(p), d(q), where p,g are secret primes, e is the public encryption exponent and d(p), d(q) are the private decryption exponents. We present an efficient method to select CRT-RSA parameters in such a manner so that the decryption becomes faster for small encryption exponents. This is the most frequently used situation for application of RSA in commercial domain. Our idea is to choose e and the factors (with low Hamming weight) of d(p), d(q) first and then applying the extended Euclidean algorithm, we obtain p, q of same bit size. For small e, we get an asymptotic reduction of the order of 1/3 in the decryption time compared to standard CRT-RSA parameters for large N = pq. In case of practical parameters, with 1024 bits N and e = 2(16) + 1, we achieve a reduction of more than 27%. Extensive security analysis is presented for our selected parameters and benchmark examples are also provided.
引用
收藏
页码:26 / 40
页数:15
相关论文
共 50 条
  • [21] Wagner's attack on a secure CRT-RSA algorithm reconsidered
    Bloemer, Johannes
    Otto, Martin
    FAULT DIAGNOISIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 13 - 23
  • [22] Small CRT-Exponent RSA Revisited
    Takayasu, Atsushi
    Lu, Yao
    Peng, Liqiang
    JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1337 - 1382
  • [23] Small CRT-Exponent RSA Revisited
    Takayasu, Atsushi
    Lu, Yao
    Peng, Liqiang
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 130 - 159
  • [24] Cryptanalysis of RSA with Multiple Small Secret Exponents
    Takayasu, Atsushi
    Kunihiro, Noboru
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 176 - 191
  • [25] RSA Encryption/Decryption Implementation Based on Zedboard
    Bai, Xu
    Jiang, Lei
    Liu, Xinxing
    Tan, Jianlong
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 114 - 121
  • [26] Multi-factor Rebalanced RSA-CRT Encryption Schemes
    Ou, Huayin
    Wei, Baodian
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 1986 - 1990
  • [27] CRT-RSA的连分数算法攻击的分析
    童子圣
    孙强
    微计算机信息, 2009, 25 (09) : 70 - 71
  • [28] On Deterministic Polynomial-time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
    Maitra, Subhamoy
    Sarkar, Santanu
    DEFENCE SCIENCE JOURNAL, 2012, 62 (02) : 122 - 126
  • [29] Revisiting the Polynomial-Time Equivalence of Computing the CRT-RSA Secret Key and Factoring
    Zheng, Mengce
    MATHEMATICS, 2022, 10 (13)
  • [30] Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?
    Barbu, Guillaume
    Battistello, Alberto
    Dabosville, Guillaume
    Giraud, Christophe
    Renault, Guenael
    Renner, Soline
    Zeitoun, Rina
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 198 - 215