Revisiting Wiener's attack - New weak keys in RSA

被引:0
|
作者
Maitra, Subhamoy [1 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Stat Inst, Kolkata 700108, India
来源
关键词
cryptanalysis; RSA; factorization; weak keys;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we revisit, Wiener's method (IEFF-IT, 1990) of continued fraction (CF) to find new weaknesses in RSA. We consider RSA with N = pq; q < p < 2q; public encryption exponent c and private decryption exponent d. Our motivation is to find out when RSA is insecure given d. is O(n(delta)), where we are mostly interested in the range 0.3 <= delta <= 0.5. We use both the upper and lower bounds on phi(N) and then try to find out what are the cases when t/d is a convergent in the CF expression of e/N - 3/root 2 root N + 1. First. we show that the RSA keys are weak when d = N-delta and delta < 3/4 - gamma - tau, where 2q - p = N-gamma and tau is small value based on certain parameters. This presents additional results over the work of de Weger (AAECC 2002). Further we show that, the RSA keys are weak when d < 1/2 N-delta and e is O(N3/2-2 delta) for delta <= 1/2. Using similar idea we also present new results over the work of Blomer and May (PKC 2004).
引用
收藏
页码:228 / 243
页数:16
相关论文
共 50 条
  • [41] A New LSB Attack on Special-Structured RSA Primes
    Abd Ghafar, Amir Hamzah
    Ariffin, Muhammad Rezal Kamel
    Asbullah, Muhammad Asyraf
    SYMMETRY-BASEL, 2020, 12 (05):
  • [42] A New Attack on RSA with Known Middle Bits of the Private Key
    Wang, Shixiong
    Qu, Longjiang
    Li, Chao
    Fu, Shaojing
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (12) : 2677 - 2685
  • [43] A New Lattice Construction for Partial Key Exposure Attack for RSA
    Aono, Yoshinori
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 34 - 53
  • [44] A New Improved Bound for Short Decryption Exponent on RSA Modulus N = pq Using Wiener's Method
    Abubakar, S., I
    Ariffin, M. R. K.
    Asbullah, M. A.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2019, 13 : 89 - 99
  • [45] A new distributed primality test for shared RSA keys using quadratic fields
    Biehl, I
    Takagi, T
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 1 - 16
  • [46] Attack against ibrahim's distributed key generation for RSA
    Brzeźniak, Blazej
    Hanzlik, Lucjan
    Kubiak, Przemyslaw
    Kutylowski, Mirosllaw
    International Journal of Network Security, 2013, 15 (04) : 313 - 316
  • [47] Seifert's RSA fault attack: Simplified analysis and generalizations
    Muir, James A.
    Information and Communications Security, Proceedings, 2006, 4307 : 420 - 434
  • [48] New Cross Correlation Attack Methods on the Montgomery Ladder Implementation of RSA
    Akalp Kuzu, Ebru
    Soysal, Betul
    Sahinoglu, Muhammet
    Guvenc, Umut
    Tangel, Ali
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 138 - 142
  • [49] A New Partial Key Exposure Attack on Multi-power RSA
    Esgin, Muhammed F.
    Kiraz, Mehmet S.
    Uzunkol, Osmanbey
    ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 103 - 114
  • [50] Small Secret-Key Attack on a Takagi's Variant of RSA
    Itoh, Kouichi
    Kunihiro, Noboru
    Kurosawa, Kaoru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01): : 33 - 41