On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA

被引:1
|
作者
Shparlinski, IE [1 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
关键词
RSA; fixed encryption exponent; decryption exponent; boneh; Durfee and Frankel attack; safety/security in digital systems;
D O I
10.1016/j.ipl.2004.07.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Let us fix a security parameter n and a sufficiently large encryption exponent e. We show that for a random choice of the RSA modulus m = pq, where p and q are n-bit primes, the decryption exponent d, defined by ed equivalent to 1 (mod phi(m)) is uniformly distributed modulo phi(m). It is known, due to recent work of Boneh, Durfee and Frankel, that additional information about some bits of d may turn out to be dramatic for the security of the whole cryptosystem. Our uniformity of distribution result implies that sufficiently long strings of the most and the least significant bits of d, which are vulnerable to such attacks, behave as random binary vectors. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:143 / 147
页数:5
相关论文
共 42 条
  • [1] Publishing Upper Half of RSA Decryption Exponent
    Maitra, Subhamoy
    Sarkar, Santanu
    Sen Gupta, Sourav
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 25 - 39
  • [2] Cryptanalysis of RSA with more than one decryption exponent
    Sarkar, Santanu
    Maitra, Subhamoy
    INFORMATION PROCESSING LETTERS, 2010, 110 (8-9) : 336 - 340
  • [3] Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization
    Huang, Zhangjie
    Hu, Lei
    Xu, Jun
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 207 - 219
  • [4] An improved cryptanalysis of large RSA decryption exponent with constrained secret key
    Mumtaz M.
    Ping L.
    International Journal of Information and Computer Security, 2021, 14 (02) : 102 - 117
  • [5] An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent
    Kumar, R. Santosh
    Prakash, K. L. N. C.
    Krishna, S. R. M.
    CRYPTOLOGIA, 2025, 49 (01) : 1 - 14
  • [6] The new Equation for RSA's Decryption Process Appropriate with High Private Key Exponent
    Somsuk, Kritsanapong
    2017 21ST INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC 2017), 2017, : 45 - 48
  • [7] Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes
    R. Santosh Kumar
    K. L. N. C. Prakash
    S. R. M. Krishna
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 195 - 202
  • [8] Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes
    Kumar, R. Santosh
    Prakash, K. L. N. C.
    Krishna, S. R. M.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 195 - 202
  • [9] Short-Exponent RSA
    Sun, Hung-Min
    Yang, Cheng-Ta
    Wu, Mu-En
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (03): : 912 - 918
  • [10] On the design of RSA with short secret exponent
    Sun, HM
    Yang, WC
    Laih, CS
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2002, 18 (01) : 1 - 18