Cryptanalysis of Prime Power RSA with two private exponents

被引:0
|
作者
ZHENG MengCe [1 ,2 ]
HU HongGang [1 ,2 ]
机构
[1] Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences
[2] School of Information Science and Technology, University of Science and Technology of China
基金
中国国家自然科学基金;
关键词
cryptanalysis; Prime Power RSA; two private exponents; LLL algorithm; Coppersmith’s techniques;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper, we consider a variant of RSA schemes called Prime Power RSA with modulus N= prq for r 2, where p, q are of the same bit-size. May showed that when private exponent d<N;/(r+1);or d < N;, N can be factored in polynomial time in PKC 2004. Later in 2014, Sarkar improved the bound for r 5. We propose a new cryptanalytic method to attack this RSA variant when given two pairs of public and private exponents, namely(e1, d1) and(e2, d2) with the same modulus N. Suppose that we know d1 < Nδ1and d2 < Nδ2. Our results show that when δ1δ2 <((r-1)/(r+1));, Prime Power RSA is insecure.
引用
收藏
页码:59 / 66
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis of Prime Power RSA with two private exponents
    Zheng MengCe
    Hu HongGang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 8
  • [2] New Cryptanalysis of Prime Power RSA with Two Private Exponents
    Wang, Shixiong
    Sun, Minghao
    MATHEMATICS, 2024, 12 (21)
  • [3] Cryptanalysis of RSA with two decryption exponents
    Sarkar, Santanu
    Maitra, Subhamoy
    INFORMATION PROCESSING LETTERS, 2010, 110 (05) : 178 - 181
  • [4] Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach
    Ravva, Santosh Kumar
    Krishna, Sureddi R. M.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 377 - 389
  • [5] Cryptanalysis of Prime Power RSA with two private exponents针对具有2个公私钥对的素数幂RSA体制的密码分析
    MengCe Zheng
    HongGang Hu
    Science China Information Sciences, 2015, 58 : 1 - 8
  • [6] Improved Results on Cryptanalysis of Prime Power RSA
    Peng, Liqiang
    Hu, Lei
    Lu, Yao
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 287 - 303
  • [7] CRYPTANALYSIS OF SHORT RSA SECRET EXPONENTS
    WIENER, MJ
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 372 - 372
  • [8] CRYPTANALYSIS OF SHORT RSA SECRET EXPONENTS
    WIENER, MJ
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (03) : 553 - 558
  • [9] Cryptanalysis of RSA with Small Prime Combination
    Meng, Xianmeng
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 104 - 112
  • [10] Cryptanalysis of RSA with smooth prime sum
    Semmouni, Meryem Cherkaoui
    Nitaj, Abderrahmane
    Belkasmi, Mostafa
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (08): : 2183 - 2203