Cargando…
Attacking RSA Using an Arbitrary Parameter
In this paper, we introduce a parameter u that is related to N via an arbitrary relation. By knowing the parameter along with RSA public key pairs, (N, e), we conduct two new attacks on the RSA cryptosystem. The first attack works on the equation [Formula: see text] where [Formula: see text] is the...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334984/ http://dx.doi.org/10.1007/978-3-030-51938-4_19 |
_version_ | 1783554044961226752 |
---|---|
author | Ariffin, Muhammad Rezal Kamel Ghafar, Amir Hamzah Abd Asbullah, Muhammad Asyraf |
author_facet | Ariffin, Muhammad Rezal Kamel Ghafar, Amir Hamzah Abd Asbullah, Muhammad Asyraf |
author_sort | Ariffin, Muhammad Rezal Kamel |
collection | PubMed |
description | In this paper, we introduce a parameter u that is related to N via an arbitrary relation. By knowing the parameter along with RSA public key pairs, (N, e), we conduct two new attacks on the RSA cryptosystem. The first attack works on the equation [Formula: see text] where [Formula: see text] is the best known lower bound of [Formula: see text]. It combines the continued fraction method and Coppersmith’s method to factor N in polynomial time. The second attack shows that given [Formula: see text] for [Formula: see text] and a fixed X, we can simultaneously factor the k RSA moduli. It manipulates the result from diophantine approximation to enable the conditions of Coppersmith’s method. These attacks show that there are more possible weak RSA key pairs. |
format | Online Article Text |
id | pubmed-7334984 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-73349842020-07-06 Attacking RSA Using an Arbitrary Parameter Ariffin, Muhammad Rezal Kamel Ghafar, Amir Hamzah Abd Asbullah, Muhammad Asyraf Progress in Cryptology - AFRICACRYPT 2020 Article In this paper, we introduce a parameter u that is related to N via an arbitrary relation. By knowing the parameter along with RSA public key pairs, (N, e), we conduct two new attacks on the RSA cryptosystem. The first attack works on the equation [Formula: see text] where [Formula: see text] is the best known lower bound of [Formula: see text]. It combines the continued fraction method and Coppersmith’s method to factor N in polynomial time. The second attack shows that given [Formula: see text] for [Formula: see text] and a fixed X, we can simultaneously factor the k RSA moduli. It manipulates the result from diophantine approximation to enable the conditions of Coppersmith’s method. These attacks show that there are more possible weak RSA key pairs. 2020-06-06 /pmc/articles/PMC7334984/ http://dx.doi.org/10.1007/978-3-030-51938-4_19 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Ariffin, Muhammad Rezal Kamel Ghafar, Amir Hamzah Abd Asbullah, Muhammad Asyraf Attacking RSA Using an Arbitrary Parameter |
title | Attacking RSA Using an Arbitrary Parameter |
title_full | Attacking RSA Using an Arbitrary Parameter |
title_fullStr | Attacking RSA Using an Arbitrary Parameter |
title_full_unstemmed | Attacking RSA Using an Arbitrary Parameter |
title_short | Attacking RSA Using an Arbitrary Parameter |
title_sort | attacking rsa using an arbitrary parameter |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334984/ http://dx.doi.org/10.1007/978-3-030-51938-4_19 |
work_keys_str_mv | AT ariffinmuhammadrezalkamel attackingrsausinganarbitraryparameter AT ghafaramirhamzahabd attackingrsausinganarbitraryparameter AT asbullahmuhammadasyraf attackingrsausinganarbitraryparameter |