Cargando…

Attacking RSA Using an Arbitrary Parameter

In this paper, we introduce a parameter u that is related to N via an arbitrary relation. By knowing the parameter along with RSA public key pairs, (N, e), we conduct two new attacks on the RSA cryptosystem. The first attack works on the equation [Formula: see text] where [Formula: see text] is the...

Descripción completa

Detalles Bibliográficos
Autores principales: Ariffin, Muhammad Rezal Kamel, Ghafar, Amir Hamzah Abd, Asbullah, Muhammad Asyraf
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334984/
http://dx.doi.org/10.1007/978-3-030-51938-4_19
Descripción
Sumario:In this paper, we introduce a parameter u that is related to N via an arbitrary relation. By knowing the parameter along with RSA public key pairs, (N, e), we conduct two new attacks on the RSA cryptosystem. The first attack works on the equation [Formula: see text] where [Formula: see text] is the best known lower bound of [Formula: see text]. It combines the continued fraction method and Coppersmith’s method to factor N in polynomial time. The second attack shows that given [Formula: see text] for [Formula: see text] and a fixed X, we can simultaneously factor the k RSA moduli. It manipulates the result from diophantine approximation to enable the conditions of Coppersmith’s method. These attacks show that there are more possible weak RSA key pairs.