Trading decryption for speeding encryption in Rebalanced-RSA

被引:8
作者
Sun, Hung-Min [1 ]
Wu, Mu-En [2 ]
Hinek, M. Jason [3 ]
Yang, Cheng-Ta [4 ]
Tseng, Vincent S. [4 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30043, Taiwan
[2] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[4] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
关键词
RSA; CRT; Encryption; Digital signatures; Lattice basis reduction; Cryptanalysis; SHORT SECRET EXPONENT; CRYPTANALYSIS; ALGORITHM; EQUATIONS;
D O I
10.1016/j.jss.2009.04.001
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In 1982, Quisquater and Couvreur proposed an RSA variant, called RSA-CRT, based on the Chinese Remainder Theorem to speed up RSA decryption. In 1990, Wiener suggested another RSA variant, called Rebalanced-RSA, which further speeds up RSA decryption by shifting decryption costs to encryption costs. However, this approach essentially maximizes the encryption time since the public exponent e is generally about the same order of magnitude as the RSA modulus. In this paper, we introduce two variants of Rebalanced-RSA in which the public exponent e is much smaller than the modulus, thus reducing the encryption costs, while still maintaining low decryption costs. For a 1024-bit RSA modulus, our first variant (Scheme A) offers encryption times that are at least 2.6 times faster than that in the original Rebalanced-RSA, while the second variant (Scheme B) offers encryption times at least 3 times faster. In both variants, the decrease in encryption costs is obtained at the expense of slightly increased decryption costs and increased key generation costs. Thus, the variants proposed here are best suited for applications which require low costs in encryption and decryption. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:1503 / 1512
页数:10
相关论文
共 24 条
[1]  
[Anonymous], COMMUN ACM
[2]  
Bleichenbacher D, 2006, LECT NOTES COMPUT SC, V3958, P1
[3]  
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[4]   Cryptanalysis of RSA with private key d less than N0.292 [J].
Boneh, D ;
Durfee, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1339-1349
[5]  
BONEH D., 2002, CRYPTOBYTES, V5, P1
[6]  
BONEH D, 1999, NOT AM MATH SOC, V46, P203
[7]   Small solutions to polynomial equations, and low exponent RSA vulnerabilities [J].
Coppersmith, D .
JOURNAL OF CRYPTOLOGY, 1997, 10 (04) :233-260
[8]  
COPPERSMITH D, 1996, LECT NOTES COMPUT SC, V1070, P1
[9]  
DURFEE G, LNCS, V1976, P14
[10]  
Galbraith SD, 2005, LECT NOTES COMPUT SC, V3574, P280