Revisiting Wiener's attack - New weak keys in RSA

被引:0
|
作者
Maitra, Subhamoy [1 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Stat Inst, Kolkata 700108, India
来源
关键词
cryptanalysis; RSA; factorization; weak keys;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we revisit, Wiener's method (IEFF-IT, 1990) of continued fraction (CF) to find new weaknesses in RSA. We consider RSA with N = pq; q < p < 2q; public encryption exponent c and private decryption exponent d. Our motivation is to find out when RSA is insecure given d. is O(n(delta)), where we are mostly interested in the range 0.3 <= delta <= 0.5. We use both the upper and lower bounds on phi(N) and then try to find out what are the cases when t/d is a convergent in the CF expression of e/N - 3/root 2 root N + 1. First. we show that the RSA keys are weak when d = N-delta and delta < 3/4 - gamma - tau, where 2q - p = N-gamma and tau is small value based on certain parameters. This presents additional results over the work of de Weger (AAECC 2002). Further we show that, the RSA keys are weak when d < 1/2 N-delta and e is O(N3/2-2 delta) for delta <= 1/2. Using similar idea we also present new results over the work of Blomer and May (PKC 2004).
引用
收藏
页码:228 / 243
页数:16
相关论文
共 50 条
  • [31] A new attack on some RSA variants
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    THEORETICAL COMPUTER SCIENCE, 2023, 960
  • [32] Weak-keys and key-recovery attack for TinyJAMBU
    Dutta, Pranjal
    Rajasree, Mahesh Sreekumar
    Sarkar, Santanu
    SCIENTIFIC REPORTS, 2022, 12 (01):
  • [33] New Weak Keys in Simplified IDEA
    Hafman, Sari Agustini
    Muhafidzah, Arini
    PROCEEDINGS OF THE 7TH SEAMS UGM INTERNATIONAL CONFERENCE ON MATHEMATICS AND ITS APPLICATIONS 2015: ENHANCING THE ROLE OF MATHEMATICS IN INTERDISCIPLINARY RESEARCH, 2016, 1707
  • [34] A new class of weak keys for Blowfish
    Kara, Orhun
    Manap, Cevat
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 167 - +
  • [35] A New Class of Weak Encryption Exponents in RSA
    Maitra, Subhamoy
    Sarkar, Santanu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 337 - 349
  • [36] Revisiting Persistent Fault Analysis: Assessing Weak Keys and Strong Keys in GIFT-64 Lightweight Cipher
    PROCEEDINGS OF THE 2020 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2020,
  • [37] A new attack on RSA with two or three decryption exponents
    Nitaj, Abderrahmane
    JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2013, 42 (1-2) : 309 - 319
  • [38] A New Attack on Special-Structured RSA Primes
    Ghafar, A. H. A.
    Arin, M. R. K.
    Asbullah, M. A.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2019, 13 : 111 - 125
  • [39] A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations
    Susilo, Willy
    Tonien, Joseph
    THEORETICAL COMPUTER SCIENCE, 2021, 885 : 125 - 130
  • [40] A New Side-Channel Attack on RSA Prime Generation
    Finke, Thomas
    Gebhardt, Max
    Schindler, Werner
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 141 - 155