Analysis of Iterated Modular Exponentiation: The Orbits of cursive Greek chiα mod N

被引:11
作者
Brennan J.J. [1 ]
Geist B. [2 ]
机构
[1] Electronic Data Systems, Troy, MI 48098
[2] Unisys Corporation, Plymouth, MI 48170-1892
关键词
Blum; Blum and Shub pseudo-random generator; Iterated encryption; RSA;
D O I
10.1023/A:1008289605486
中图分类号
学科分类号
摘要
Let N and α be integers larger than 1. Define an orbit to be the collection of residues in Z*N generated by iteratively applying x → xα mod N to an element x ∈ Z*N which eventually maps back to itself. An orbit's length is the number of distinct residues in the orbit. When N is a large bicomposite integer, such as is commonly used in many cryptographic applications, and when certain prime factorizations related to N are known, all orbit lengths and the number of orbits of each possible length can be efficiently computed using the results presented. If the required integer factorizations are only partially known, the risk that a randomly selected periodic element might produce an orbit shorter than some (typically large) divisor of φ(φ(N)) can be bounded. The information needed to produce such a bound is fully available when the prime factors of N are generated using the prime generation algorithm defined in Maurer [7]. Results presented can assist in choosing wisely a modulus N for the Blum, Blum, and Shub pseudo-random bit generator. If N is a bicomposite RSA modulus, the analysis shows how to quantify the risk posed by an iterated encryption attack.
引用
收藏
页码:229 / 245
页数:16
相关论文
共 9 条
[1]  
Alexi W., Chor B., Goldreich O., Schnorr C.P., RSA and Rabin functions: Certain parts are as hard as the whole, Siam Journal of Computing, 17, 2, pp. 194-209, (1988)
[2]  
Atkins D., Graff M., Lenstra A.K., Leyland P.C., The magic words are squeamish ossifrage, Advances in Cryptology - Asiacrypt'94, pp. 263-277, (1994)
[3]  
Blum L., Blum M., Shub M., A simple unpredictable pseudo-random number generator, Siam Journal of Computing, 15, 2, pp. 364-381, (1986)
[4]  
Burton D.M., Elementary Number Theory, (1994)
[5]  
Chor B., Goldreich O., Goldwasser S., The bit security of modular squaring given partial factorization of the modulus, Advances in Cryptology: Proceedings of Crypto, 85, pp. 448-457, (1986)
[6]  
Knuth D.E., The Art of Computer Programming: Seminumerical Algorithms, 2, (1981)
[7]  
Maurer U.M., Fast generation of prime numbers and secure public-key cryptographic parameters, Journal of Cryptology, 8, pp. 123-155, (1995)
[8]  
Pocklington H.C., The determination of the prime or composite nature of large numbers by Fermat's Theorem, Proceedings of the Cambridge Philosophical Society, 18, pp. 29-30, (1914)
[9]  
Vazirani U.V., Vazirani V.V., Efficient and secure pseudo-random number generation, Proc. 25th IEEE Symposium on Foundations of Computer Science, pp. 458-463, (1984)