Cargando…

Attacking RSA Using an Arbitrary Parameter

In this paper, we introduce a parameter u that is related to N via an arbitrary relation. By knowing the parameter along with RSA public key pairs, (N, e), we conduct two new attacks on the RSA cryptosystem. The first attack works on the equation [Formula: see text] where [Formula: see text] is the...

Descripción completa

Detalles Bibliográficos
Autores principales: Ariffin, Muhammad Rezal Kamel, Ghafar, Amir Hamzah Abd, Asbullah, Muhammad Asyraf
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334984/
http://dx.doi.org/10.1007/978-3-030-51938-4_19
_version_ 1783554044961226752
author Ariffin, Muhammad Rezal Kamel
Ghafar, Amir Hamzah Abd
Asbullah, Muhammad Asyraf
author_facet Ariffin, Muhammad Rezal Kamel
Ghafar, Amir Hamzah Abd
Asbullah, Muhammad Asyraf
author_sort Ariffin, Muhammad Rezal Kamel
collection PubMed
description In this paper, we introduce a parameter u that is related to N via an arbitrary relation. By knowing the parameter along with RSA public key pairs, (N, e), we conduct two new attacks on the RSA cryptosystem. The first attack works on the equation [Formula: see text] where [Formula: see text] is the best known lower bound of [Formula: see text]. It combines the continued fraction method and Coppersmith’s method to factor N in polynomial time. The second attack shows that given [Formula: see text] for [Formula: see text] and a fixed X, we can simultaneously factor the k RSA moduli. It manipulates the result from diophantine approximation to enable the conditions of Coppersmith’s method. These attacks show that there are more possible weak RSA key pairs.
format Online
Article
Text
id pubmed-7334984
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73349842020-07-06 Attacking RSA Using an Arbitrary Parameter Ariffin, Muhammad Rezal Kamel Ghafar, Amir Hamzah Abd Asbullah, Muhammad Asyraf Progress in Cryptology - AFRICACRYPT 2020 Article In this paper, we introduce a parameter u that is related to N via an arbitrary relation. By knowing the parameter along with RSA public key pairs, (N, e), we conduct two new attacks on the RSA cryptosystem. The first attack works on the equation [Formula: see text] where [Formula: see text] is the best known lower bound of [Formula: see text]. It combines the continued fraction method and Coppersmith’s method to factor N in polynomial time. The second attack shows that given [Formula: see text] for [Formula: see text] and a fixed X, we can simultaneously factor the k RSA moduli. It manipulates the result from diophantine approximation to enable the conditions of Coppersmith’s method. These attacks show that there are more possible weak RSA key pairs. 2020-06-06 /pmc/articles/PMC7334984/ http://dx.doi.org/10.1007/978-3-030-51938-4_19 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Ariffin, Muhammad Rezal Kamel
Ghafar, Amir Hamzah Abd
Asbullah, Muhammad Asyraf
Attacking RSA Using an Arbitrary Parameter
title Attacking RSA Using an Arbitrary Parameter
title_full Attacking RSA Using an Arbitrary Parameter
title_fullStr Attacking RSA Using an Arbitrary Parameter
title_full_unstemmed Attacking RSA Using an Arbitrary Parameter
title_short Attacking RSA Using an Arbitrary Parameter
title_sort attacking rsa using an arbitrary parameter
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7334984/
http://dx.doi.org/10.1007/978-3-030-51938-4_19
work_keys_str_mv AT ariffinmuhammadrezalkamel attackingrsausinganarbitraryparameter
AT ghafaramirhamzahabd attackingrsausinganarbitraryparameter
AT asbullahmuhammadasyraf attackingrsausinganarbitraryparameter