New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents

被引:0
作者
Lu, Yao [1 ]
Zhang, Rui [1 ]
Lin, Dongdai [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur SKLOIS, Beijing 100864, Peoples R China
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014 | 2014年 / 8479卷
关键词
lattices; RSA; Coppersmith's method; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Crypto'03, Blomer and May provided several partial key exposure attacks on CRT-RSA. In their attacks, they suppose that an attacker can either succeed to obtain the most significant bits (MSBs) or the least significant bits (LSBs) of d(p) = d mod (p - 1) in consecutive order. For the case of known LSBs of dp, their algorithm is polynomial-time only for small public exponents e (i.e. e = poly(log N)). However, in some practical applications, we prefer to use large e (Like e approximate to d(p), to let the public and private operations with the same computational effort). In this paper, we propose some lattice-based attacks for this extended setting. For known LSBs case, we introduce two approaches that work up to e < N-3/8. Similar results (though not as strong) are obtained for MSBs case. We also provide detailed experimental results to justify our claims.
引用
收藏
页码:151 / 162
页数:12
相关论文
共 24 条
  • [1] Bleichenbacher D, 2006, LECT NOTES COMPUT SC, V3958, P1
  • [2] Blömer J, 2003, LECT NOTES COMPUT SC, V2729, P27
  • [3] Cryptanalysis of RSA with private key d less than N0.292
    Boneh, D
    Durfee, G
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1339 - 1349
  • [4] Boneh D., 1998, FULL VERSION WORK AS, V98
  • [5] Boneh D., 1999, ADV CRYPTOLOGY CRYPT, V1666, P787
  • [6] The Magma algebra system .1. The user language
    Bosma, W
    Cannon, J
    Playoust, C
    [J]. JOURNAL OF SYMBOLIC COMPUTATION, 1997, 24 (3-4) : 235 - 265
  • [7] Ernst M, 2005, LECT NOTES COMPUT SC, V3494, P371
  • [8] Galbraith SD, 2005, LECT NOTES COMPUT SC, V3574, P280
  • [9] Herrmann M, 2011, LECT NOTES COMPUT SC, V6737, P92, DOI 10.1007/978-3-642-21969-6_6
  • [10] Herrmann M, 2010, LECT NOTES COMPUT SC, V6056, P53