Efficient CRT-RSA Decryption for Small Encryption Exponents

被引:0
作者
Maitra, Subhamoy [1 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS | 2010年 / 5985卷
关键词
RSA; CRT-RSA; Key Generation; Efficient Decryption; Primes; Exponents; KEY EXPOSURE ATTACKS; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Consider CRT-RSA with the parameters p,q,e, d(p), d(q), where p,g are secret primes, e is the public encryption exponent and d(p), d(q) are the private decryption exponents. We present an efficient method to select CRT-RSA parameters in such a manner so that the decryption becomes faster for small encryption exponents. This is the most frequently used situation for application of RSA in commercial domain. Our idea is to choose e and the factors (with low Hamming weight) of d(p), d(q) first and then applying the extended Euclidean algorithm, we obtain p, q of same bit size. For small e, we get an asymptotic reduction of the order of 1/3 in the decryption time compared to standard CRT-RSA parameters for large N = pq. In case of practical parameters, with 1024 bits N and e = 2(16) + 1, we achieve a reduction of more than 27%. Extensive security analysis is presented for our selected parameters and benchmark examples are also provided.
引用
收藏
页码:26 / 40
页数:15
相关论文
共 50 条
[31]   Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents [J].
Suzuki, Kaichi ;
Takayasu, Atsushi ;
Kunihiro, Noboru .
THEORETICAL COMPUTER SCIENCE, 2020, 841 :62-83
[32]   A secured modular exponentiation for rsa and crt-rsa with dual blinding to resist power analysis attacks [J].
Mahanta H.J. ;
Khan A.K. .
International Journal of Information and Computer Security, 2020, 12 (2-3) :112-129
[33]   CRT-RSA的小dp,dq实际攻击研究 [J].
李强 ;
郑群雄 ;
戚文峰 .
密码学报(中英文), 2025, 12 (03) :604-626
[34]   Partial Key Attack Given MSBs of CRT-RSA Private Keys [J].
Abd Ghafar, Amir Hamzah ;
Ariffin, Muhammad Rezal Kamel ;
Yasin, Sharifah Md ;
Sapar, Siti Hasana .
MATHEMATICS, 2020, 8 (12) :1-20
[35]   Generalized cryptanalysis of small CRT-exponent RSA [J].
Peng, Liqiang ;
Takayasu, Atsushi .
THEORETICAL COMPUTER SCIENCE, 2019, 795 :432-458
[36]   On Second-Order Fault Analysis Resistance for CRT-RSA Implementations [J].
Dottax, Emmanuelle ;
Giraud, Christophe ;
Rivain, Matthieu ;
Sierra, Yannick .
INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 :68-+
[37]   Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach [J].
Ravva, Santosh Kumar ;
Krishna, Sureddi R. M. .
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) :377-389
[38]   A New Class of Weak Encryption Exponents in RSA [J].
Maitra, Subhamoy ;
Sarkar, Santanu .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 :337-349
[39]   Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits [J].
Takayasu, Atsushi ;
Kunihiro, Noboru .
INFORMATION SECURITY, (ISC 2016), 2016, 9866 :35-47
[40]   Improved Shamir's CRT-RSA Algorithm: Revisit with the Modulus Chaining Method [J].
Lee, Seungkwang ;
Choi, Dooho ;
Choi, Yongje .
ETRI JOURNAL, 2014, 36 (03) :469-478