Generalized cryptanalysis of small CRT-exponent RSA

被引:7
作者
Peng, Liqiang [1 ,2 ]
Takayasu, Atsushi [3 ,4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[3] Univ Tokyo, Dept Math Informat, Tokyo, Japan
[4] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
基金
中国国家自然科学基金;
关键词
CRT-RSA; Cryptanalysis; Lattices; Coppersmith's method; KEY EXPOSURE ATTACKS; SECRET EXPONENT; SMALL ROOT; EQUATIONS; VARIANT; BOUNDS;
D O I
10.1016/j.tcs.2019.07.031
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There have been several works for studying the security of CRT-RSA with small CRT exponents d(p) and d(q) by using lattice-based Coppersmith's method. Thus far, two attack scenarios have been mainly studied: (1) d(q) is small with unbalanced prime factors p << q. (2) Both d(p) and d(q) are small for balanced p approximate to q. The best attacks for the both scenarios were proposed by Takayasu-Lu-Peng (Eurocrypt'17. Journal of Cryptology'19) and the attack conditions are much better than the other known attacks. Although the attacks have been very useful for studying the security of CRT-RSA, the structures of their proposed lattices are not well understood. In this paper, to further study the security of CRT-RSA, we first define a generalized attack scenario to unify the previous ones. Specifically, all p, q, d(p), and d(q) can be of arbitrary sizes. Furthermore, we propose improved attacks in this paper when d(p) and/or p is sufficiently small. Technically, we construct a lattice whose basis vectors are chosen flexibly depending on the sizes of p, q, d(p), and d(q). Since the attack scenarios (1) and (2) are simpler than our general scenario, the previous Takayasu-Lu-Peng's lattices are simple special cases of ours. We are able to achieve the flexible lattice constructions by exploiting implicit but essential structures of Takayasu-Lu-Peng's lattices. We check the validity of our proposed attacks by computer experiments. We believe that the deeper understanding of the lattice structures will be useful for studying the security of CRT-RSA even in other scenarios. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:432 / 458
页数:27
相关论文
共 51 条
[1]  
Aono Yoshinori, 2013, Information Security and Privacy. 18th Australasian Conference, ACISP 2013. Proceedings: LNCS 7959, P88, DOI 10.1007/978-3-642-39059-3_7
[2]   On the optimality of lattices for the coppersmith technique [J].
Aono, Yoshinori ;
Agrawal, Manindra ;
Satoh, Takakazu ;
Watanabe, Osamu .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (02) :169-195
[3]  
Aono Y, 2009, LECT NOTES COMPUT SC, V5443, P34
[4]  
Bleichenbacher D, 2006, LECT NOTES COMPUT SC, V3958, P1
[5]  
Blömer J, 2003, LECT NOTES COMPUT SC, V2729, P27
[6]  
Blömer J, 2001, LECT NOTES COMPUT SC, V2146, P4
[7]   Cryptanalysis of RSA with private key d less than N0.292 [J].
Boneh, D ;
Durfee, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1339-1349
[8]  
Boneh Dan, 1999, Notices of the AMS, V46, P203
[9]   Small solutions to polynomial equations, and low exponent RSA vulnerabilities [J].
Coppersmith, D .
JOURNAL OF CRYPTOLOGY, 1997, 10 (04) :233-260
[10]  
Coppersmith D, 2001, LECT NOTES COMPUT SC, V2146, P20