Generalization of Some Attacks on RSA with Small Prime Combination and Small Private Exponent

被引:1
作者
Han, Lidong [1 ]
Xu, Guangwu [2 ]
机构
[1] Shandong Univ, Key Lab Cryptog Technol & Informat Secur, Minist Educ, Jinan 250100, Peoples R China
[2] Univ Wisconsin, Dept Elect Engn & Comp Sci, Milwaukee, WI 53201 USA
来源
2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 1, PROCEEDINGS | 2009年
关键词
CRYPTANALYSIS;
D O I
10.1109/APCIP.2009.116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2002, de Weger proposed an attack on small RSA secret decryption exponent with small prime difference vertical bar p - q vertical bar, which improved the insecure private key bound of Wiener and Boneh-Durfee attacks. Recently, Maitra and Sarkar found new weak keys in another case when 2q - p is small. In this paper several results on attacking RSA with small prime differences q - p, 2p - q and sinall private exponent are generalized. Our observation is that when vertical bar ip - jq vertical bar is sinall for some integers i, j, we can explore new insecure keys in RSA. One of our results also makes some statement in literature more accurate.
引用
收藏
页码:445 / +
页数:2
相关论文
共 9 条
[1]  
Blömer J, 2004, LECT NOTES COMPUT SC, V2947, P1
[2]   Cryptanalysis of RSA with private key d less than N0.292 [J].
Boneh, D ;
Durfee, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1339-1349
[3]  
BONEH D, 1999, NOT AM MATH SOC, V46, P203
[4]   Small solutions to polynomial equations, and low exponent RSA vulnerabilities [J].
Coppersmith, D .
JOURNAL OF CRYPTOLOGY, 1997, 10 (04) :233-260
[5]   Cryptanalysis of RSA with small prime difference [J].
de Weger, B .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2002, 13 (01) :17-28
[6]  
Maitra S, 2008, LECT NOTES COMPUT SC, V5222, P228, DOI 10.1007/978-3-540-85886-7_16
[7]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
[8]  
SILVERMAN RD, 1997, CRYPTOBYTES, V3, P9
[9]   CRYPTANALYSIS OF SHORT RSA SECRET EXPONENTS [J].
WIENER, MJ .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (03) :553-558