Generalized cryptanalysis of small CRT-exponent RSA

被引:7
作者
Peng, Liqiang [1 ,2 ]
Takayasu, Atsushi [3 ,4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[3] Univ Tokyo, Dept Math Informat, Tokyo, Japan
[4] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
基金
中国国家自然科学基金;
关键词
CRT-RSA; Cryptanalysis; Lattices; Coppersmith's method; KEY EXPOSURE ATTACKS; SECRET EXPONENT; SMALL ROOT; EQUATIONS; VARIANT; BOUNDS;
D O I
10.1016/j.tcs.2019.07.031
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There have been several works for studying the security of CRT-RSA with small CRT exponents d(p) and d(q) by using lattice-based Coppersmith's method. Thus far, two attack scenarios have been mainly studied: (1) d(q) is small with unbalanced prime factors p << q. (2) Both d(p) and d(q) are small for balanced p approximate to q. The best attacks for the both scenarios were proposed by Takayasu-Lu-Peng (Eurocrypt'17. Journal of Cryptology'19) and the attack conditions are much better than the other known attacks. Although the attacks have been very useful for studying the security of CRT-RSA, the structures of their proposed lattices are not well understood. In this paper, to further study the security of CRT-RSA, we first define a generalized attack scenario to unify the previous ones. Specifically, all p, q, d(p), and d(q) can be of arbitrary sizes. Furthermore, we propose improved attacks in this paper when d(p) and/or p is sufficiently small. Technically, we construct a lattice whose basis vectors are chosen flexibly depending on the sizes of p, q, d(p), and d(q). Since the attack scenarios (1) and (2) are simpler than our general scenario, the previous Takayasu-Lu-Peng's lattices are simple special cases of ours. We are able to achieve the flexible lattice constructions by exploiting implicit but essential structures of Takayasu-Lu-Peng's lattices. We check the validity of our proposed attacks by computer experiments. We believe that the deeper understanding of the lattice structures will be useful for studying the security of CRT-RSA even in other scenarios. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:432 / 458
页数:27
相关论文
共 50 条
[21]   FINDING SMALL SOLUTIONS OF THE EQUATION Bx - Ay = z AND ITS APPLICATIONS TO CRYPTANALYSIS OF THE RSA CRYPTOSYSTEM [J].
Wang, Shixiong ;
Qu, Longjiang ;
Li, Chao ;
Fu, Shaojing ;
Chen, Hao .
ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, 15 (03) :441-469
[22]   Cryptanalysis of RSA with a small parameter revisited [J].
Meng, Xianmeng ;
Zheng, Xuexin .
INFORMATION PROCESSING LETTERS, 2015, 115 (11) :858-862
[23]   Cryptanalysis of RSA with small prime difference [J].
de Weger, B .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2002, 13 (01) :17-28
[24]   Cryptanalysis of the RSA variant based on cubic Pell equation [J].
Zheng, Mengce ;
Kunihiro, Noboru ;
Yao, Yuanzhi .
THEORETICAL COMPUTER SCIENCE, 2021, 889 :135-144
[25]   An improved cryptanalysis of large RSA decryption exponent with constrained secret key [J].
Mumtaz M. ;
Ping L. .
International Journal of Information and Computer Security, 2021, 14 (02) :102-117
[26]   On the Improvement of Wiener Attack on RSA with Small Private Exponent [J].
Wu, Mu-En ;
Chen, Chien-Ming ;
Lin, Yue-Hsun ;
Sun, Hung-Min .
SCIENTIFIC WORLD JOURNAL, 2014,
[27]   Small secret exponent attack on RSA variant with modulus [J].
Sarkar, Santanu .
DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) :383-392
[28]   Further Cryptanalysis of a Type of RSA Variants [J].
Shi, Gongyu ;
Wang, Geng ;
Gu, Dawu .
INFORMATION SECURITY, ISC 2022, 2022, 13640 :133-152
[29]   Cryptanalysis of Dual RSA [J].
Peng, Liqiang ;
Hu, Lei ;
Lu, Yao ;
Xu, Jun ;
Huang, Zhangjie .
DESIGNS CODES AND CRYPTOGRAPHY, 2017, 83 (01) :1-21
[30]   Generalized cryptanalysis of RSA with small public exponent针对公钥e小于等于N的0.5次幂的RSA算法的广义密码分析 [J].
Mengce Zheng ;
Honggang Hu ;
Zilong Wang .
Science China Information Sciences, 2016, 59