On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA

被引:1
作者
Shparlinski, IE [1 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
关键词
RSA; fixed encryption exponent; decryption exponent; boneh; Durfee and Frankel attack; safety/security in digital systems;
D O I
10.1016/j.ipl.2004.07.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Let us fix a security parameter n and a sufficiently large encryption exponent e. We show that for a random choice of the RSA modulus m = pq, where p and q are n-bit primes, the decryption exponent d, defined by ed equivalent to 1 (mod phi(m)) is uniformly distributed modulo phi(m). It is known, due to recent work of Boneh, Durfee and Frankel, that additional information about some bits of d may turn out to be dramatic for the security of the whole cryptosystem. Our uniformity of distribution result implies that sufficiently long strings of the most and the least significant bits of d, which are vulnerable to such attacks, behave as random binary vectors. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:143 / 147
页数:5
相关论文
共 42 条
  • [31] Collision-Based Power Attack for RSA with Small Public Exponent
    Itoh, Kouichi
    Yamamoto, Dai
    Yajima, Jun
    Ogata, Wakaha
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 897 - 908
  • [32] Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
    Sun, Hung-Min
    Wu, Mu-En
    Steinfeld, Ron
    Guo, Jian
    Wang, Huaxiong
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 49 - +
  • [33] The Implementation of the 1024-bit RSA Encryption/Decryption Algorithms Based on FPGA
    Qu, Yingjie
    Zhao, Qing
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 420 - 423
  • [34] Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA
    Herrmann, Mathias
    May, Alexander
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 53 - 69
  • [35] Small Private Exponent Attacks on RSA Using Continued Fractions and Multicore Systems
    Bahig, Hatem M.
    Nassr, Dieaa, I
    Mahdi, Mohammed A.
    Bahig, Hazem M.
    SYMMETRY-BASEL, 2022, 14 (09):
  • [36] VLSI design of an RSA encryption/decryption chip using systolic array based architecture
    Sun, Chi-Chia
    Lin, Bor-Shing
    Jan, Gene Eu
    Lin, Jheng-Yi
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2016, 103 (09) : 1538 - 1549
  • [37] Information Encryption and Decryption Analysis, Vulnerabilities and Reliability Implementing the RSA Algorithm in Python']Python
    Rodriguez G, Rocio
    Castang M, Gerardo
    Vanegas, Carlos A.
    APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 391 - 404
  • [38] Double Counting in 2t-ary RSA Precomputation Reveals the Secret Exponent
    Kaminaga, Masahiro
    Yoshikawa, Hideki
    Suzuki, Toshinori
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1394 - 1401
  • [39] Common modulus attacks on small private exponent RSA and some fast variants (in practice)
    Hinek, M. Jason
    Lam, Charles C. Y.
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (01) : 57 - 93
  • [40] A Side-channel Attack Countermeasure Based on Segmented Modular Exponent Randomizing in RSA Cryptosystem
    Zhang, Yiwei
    Zheng, Xinjian
    Peng, Bo
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 148 - 151