Breaking weak 1024-bit RSA keys with CUDA

被引:10
作者
Scharfglass, Kerry [1 ]
Weng, Darrin [1 ]
White, Joseph [1 ]
Lupo, Christopher [1 ]
机构
[1] Calif Polytech State Univ San Luis Obispo, Dept Comp Sci, San Luis Obispo, CA 93407 USA
来源
2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012) | 2012年
关键词
CUDA; RSA; greatest common divisor; parallel computation;
D O I
10.1109/PDCAT.2012.58
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An exploit involving the greatest common divisor (GCD) of RSA moduli was recently discovered [1]. This paper presents a tool that can efficiently and completely compare a large number of 1024-bit RSA public keys, and identify any keys that are susceptible to this weakness. NVIDIA's graphics processing units (GPU) and the CUDA massively-parallel programming model are powerful tools that can be used to accelerate this tool. Our method using CUDA has a measured performance speedup of 27.5 compared to a sequential CPU implementation, making it a more practical method to compare large sets of keys. A computation for finding GCDs between 200,000 keys, i.e., approximately 20 billion comparisons, was completed in 113 minutes, the equivalent of approximately 2.9 million 1024-bit GCD comparisons per second.
引用
收藏
页码:207 / 212
页数:6
相关论文
共 8 条
[1]  
[Anonymous], 2012, NVIDIA CUDA C programming guide
[2]   High Throughput Multiple-Precision GCD on the CUDA Architecture [J].
Fujimoto, Noriyuki .
2009 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2009), 2009, :507-512
[3]  
Henry R., SOLVING DISCRETE LOG
[4]  
Lenstra A. K., 2012, RON WAS WRONG WHAT I
[5]  
NVIDIA Corporation, 2012, CUDA OCC CALC
[6]  
Rivest R.L., 1977, METHOD OBTAINING DIG
[7]  
Stein J., 1967, J. Comput. Phys., V1, P397, DOI DOI 10.1016/0021-9991(67)90047-2
[8]  
Vallee B., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P77, DOI 10.1007/BFb0054853