New Attacks on RSA with Modulus N = p2q Using Continued Fractions

被引:9
作者
Asbullah, M. A. [1 ]
Ariffin, M. R. K. [1 ,2 ]
机构
[1] Univ Putra Malaysia, Inst Math Res, Al Kindi Cryptog Res Lab, Serdang 43400, Malaysia
[2] Univ Putra Malaysia, Dept Math, Fac Sci, Serdang 43400, Malaysia
来源
3RD INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2015 (SCITECH 2015) | 2015年 / 622卷
关键词
CRYPTANALYSIS;
D O I
10.1088/1742-6596/622/1/012019
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, we propose two new attacks on RSA with modulus N = p(2)q using continued fractions. Our first attack is based on the RSA key equation ed - phi(N)k = 1 where phi(N) = p(p - 1)(q - 1). Assuming that q < p < 2q, 2p(5/3)vertical bar p(1/3) - q(1/3)vertical bar < 1/3N(beta) < and d < N1-beta/2, we show that k/d can be recovered among the convorgents of the continued fraction expansion of e/N-(2N2(/3)-N-1/3). Our second attack is based on the equation eX - (N - (ap(2) bq(2))) Y = Z whore a,b are positive integers satisfying gcd(a,b) = 1, vertical bar ap(2) - bq(2)vertical bar < N-1/2 and ap(2) bq(2) N2/3+alpha with 0 < alpha < 1/3. Given the conditions vertical bar Z vertical bar < 1/3N(1/3+alpha)Y and 1 <= Y <= X < 1/2 N1/6-alpha/2, we show that one can factor N - p(2)q in polynomial time
引用
收藏
页数:9
相关论文
共 15 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
Ariffin MRK, 2013, MALAYS J MATH SCI, V7, P19
[3]  
Asbullah M A, 2014, RABIN P CRYPTOSYSTEM
[4]  
Blomer J, 2004, LNCS, V2947, P113
[5]   A Generalization of de Weger's Method [J].
Chen, Chien-Yuan ;
Hsueh, Chih-Cheng ;
Lin, Yu-Feng .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, :344-+
[6]   Small solutions to polynomial equations, and low exponent RSA vulnerabilities [J].
Coppersmith, D .
JOURNAL OF CRYPTOLOGY, 1997, 10 (04) :233-260
[7]   Cryptanalysis of RSA with small prime difference [J].
de Weger, B .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2002, 13 (01) :17-28
[8]  
Maitra S, 2008, LECT NOTES COMPUT SC, V5222, P228, DOI 10.1007/978-3-540-85886-7_16
[9]  
May A, 2004, LECT NOTES COMPUT SC, V2947, P218
[10]  
Nishioka M., 2002, LNCS, P81