New Finding on Factoring Prime Power RSA Modulus N = prq

被引:0
|
作者
Sadiq SHEHU [1 ]
Muhammad Rezal Kamel ARIFFIN [1 ,2 ]
机构
[1] Al-Kindi Cryptography Research Laboratory, Institute for Mathematical Research,Universiti Putra Malaysia
[2] Department of Mathematics, Faculty of Science, Universiti Putra Malaysia
关键词
RSA prime power; factorization; LLL algorithm; simultaneous diophantine approximations; continued fraction;
D O I
暂无
中图分类号
O156 [数论];
学科分类号
0701 ; 070101 ;
摘要
This paper proposes three new attacks. In the first attack we consider the class of the public exponents satisfying an equation e X-N Y +(ap+ bq)Y = Z for suitably small positive integers a, b. Applying continued fractions we show thatY/Xcan be recovered among the convergents of the continued fraction expansion of e/N. Moreover, we show that the number of such exponents is at least Nwhere ε≥ 0 is arbitrarily small for large N. The second and third attacks works upon k RSA public keys(N, e) when there exist k relations of the form ex-Ny+(ap+ bq)y= zor of the form ex-Ny +(ap+ bq)y = zand the parameters x, x, y, y, zare suitably small in terms of the prime factors of the moduli. We apply the LLL algorithm, and show that our strategy enables us to simultaneously factor k prime power RSA moduli.
引用
收藏
页码:404 / 418
页数:15
相关论文
共 50 条
  • [1] New Attacks on RSA with Moduli N = prq
    Nitaj, Abderrahmane
    Rachidi, Tajjeeddine
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 352 - 360
  • [2] New Cryptanalytic Results Upon Prime Power Moduli N = prq
    Shehu, Sadiq
    Ariffin, Muhammad Rezal Kamel
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND TECHNOLOGY 2018 (MATHTECH 2018): INNOVATIVE TECHNOLOGIES FOR MATHEMATICS & MATHEMATICS FOR TECHNOLOGICAL INNOVATION, 2019, 2184
  • [3] Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits
    Maitra, Subhamoy
    Sarkar, Santanu
    Sen Gupta, Sourav
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 82 - 99
  • [4] Factoring RSA Moduli with Weak Prime Factors
    Nitaj, Abderrahmane
    Rachidi, Tajjeeddine
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 361 - 374
  • [5] Factoring estimates for a 1024-bit RSA modulus
    Lenstra, A
    Tromer, E
    Shamir, A
    Kortsmit, W
    Dodson, B
    Hughes, J
    Leyland, P
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 55 - 74
  • [6] New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method
    Ariffin, Muhammad Rezal Kamel
    Abubakar, Saidu Isah
    Yunos, Faridah
    Asbullah, Muhammad Asyraf
    CRYPTOGRAPHY, 2019, 3 (01) : 1 - 25
  • [7] Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference
    Zheng, Mengce
    Kunihiro, Noboru
    Hu, Honggang
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 324 - 342
  • [8] FACTORING BY SUBSETS OF CARDINALITY OF A PRIME OR A POWER OF A PRIME
    CORRADI, K
    SZABO, S
    COMMUNICATIONS IN ALGEBRA, 1991, 19 (05) : 1585 - 1592
  • [9] Revisiting Prime Power RSA
    Sarkar, Santanu
    DISCRETE APPLIED MATHEMATICS, 2016, 203 : 127 - 133
  • [10] New Cryptanalysis of Prime Power RSA with Two Private Exponents
    Wang, Shixiong
    Sun, Minghao
    MATHEMATICS, 2024, 12 (21)