Revisiting Wiener's attack - New weak keys in RSA

被引:0
|
作者
Maitra, Subhamoy [1 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Stat Inst, Kolkata 700108, India
来源
关键词
cryptanalysis; RSA; factorization; weak keys;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we revisit, Wiener's method (IEFF-IT, 1990) of continued fraction (CF) to find new weaknesses in RSA. We consider RSA with N = pq; q < p < 2q; public encryption exponent c and private decryption exponent d. Our motivation is to find out when RSA is insecure given d. is O(n(delta)), where we are mostly interested in the range 0.3 <= delta <= 0.5. We use both the upper and lower bounds on phi(N) and then try to find out what are the cases when t/d is a convergent in the CF expression of e/N - 3/root 2 root N + 1. First. we show that the RSA keys are weak when d = N-delta and delta < 3/4 - gamma - tau, where 2q - p = N-gamma and tau is small value based on certain parameters. This presents additional results over the work of de Weger (AAECC 2002). Further we show that, the RSA keys are weak when d < 1/2 N-delta and e is O(N3/2-2 delta) for delta <= 1/2. Using similar idea we also present new results over the work of Blomer and May (PKC 2004).
引用
收藏
页码:228 / 243
页数:16
相关论文
共 50 条
  • [21] Weak Keys in RSA with Primes Sharing Least Significant Bits
    Meng, Xianmeng
    Bi, Jingguo
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 278 - +
  • [22] An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure
    Kunihiro, Noboru
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 61 - 81
  • [23] Estimating the prime-factors of an RSA modulus and an extension of the Wiener attack
    Sun, Hung-Min
    Wu, Mu-En
    Chen, Yao-Hsin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 116 - +
  • [24] Bulk GCD Computation Using a GPU to Break Weak RSA Keys
    Fujita, Toru
    Nakano, Koji
    Ito, Yasuaki
    2015 IEEE 29TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS, 2015, : 385 - 394
  • [25] A new attack on RSA and Demytko's elliptic curve cryptosystem
    Nitaj, Abderrahmane
    Fouotsa, Emmanuel
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (03): : 391 - 409
  • [26] Weak Keys for AEZ, and the External Key Padding Attack
    Mennink, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 223 - 237
  • [27] Partial Key Attack Given MSBs of CRT-RSA Private Keys
    Abd Ghafar, Amir Hamzah
    Ariffin, Muhammad Rezal Kamel
    Yasin, Sharifah Md
    Sapar, Siti Hasana
    MATHEMATICS, 2020, 8 (12) : 1 - 20
  • [28] A new related message attack on RSA
    Yacobi, Oded
    Yacobi, Yacov
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, 3895 LNCS : 187 - 195
  • [29] A new related message attack on RSA
    Yacobi, O
    Yacobi, Y
    THEORETICAL COMPUTER SCIENCE, 2006, 3895 : 187 - 195
  • [30] A new related message attack on RSA
    Yacobi, O
    Yacobi, Y
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 1 - 8