A new related message attack on RSA

被引:0
|
作者
Yacobi, O
Yacobi, Y
机构
[1] Univ Calif San Diego, Dept Math, La Jolla, CA 92093 USA
[2] Microsoft Res, Redmond, WA 98052 USA
来源
THEORETICAL COMPUTER SCIENCE | 2006年 / 3895卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms x(e) mod N and (ax+b)(e) mod N for known constants a, b is an element of Z(N), one can usually compute x in O(e log(2) e) Z(N)-operations (there axe O(e(2)) messages for which the method fails). We show that given e cryptograms c(i)equivalent to(a(i)x+b(i))(e) mod N, i=0, 1,...e-1, for any known constants a(i), b(i) is an element of Z(N), one can deterministically compute x in O(e) Z(N)-operations that depend on the cryptograms, after a pre-processing that depends only on the constants. The complexity of the pre-processing is O(e log(2) e) Z(N)-operations, and can be amortized over many instances. We also consider a special case where the overall cost of the attack is O(e) Z(N)-operations. Our tools are borrowed from numerical-analysis and adapted to handle formal polynomials over finite-rings. To the best of our knowledge their use in cryptanalysis is novel.
引用
收藏
页码:187 / 195
页数:9
相关论文
共 50 条
  • [21] A variant of Wiener’s attack on RSA
    Andrej Dujella
    Computing, 2009, 85 : 77 - 83
  • [22] An Efficient Method for Attack RSA Scheme
    Aboud, Sattar J.
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 587 - 591
  • [23] Converse results to the Wiener attack on RSA
    Steinfeld, R
    Contini, S
    Wang, HX
    Pieprzyk, J
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 184 - 198
  • [24] A cycling-like attack on RSA
    Zheng, Yonghui
    Zhu, Yuefei
    Xu, Hong
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (12): : 56 - 58
  • [25] A generalized attack on RSA type cryptosystems
    Bunder, Martin
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    THEORETICAL COMPUTER SCIENCE, 2017, 704 : 74 - 81
  • [26] A variant of Wiener's attack on RSA
    Dujella, Andrej
    COMPUTING, 2009, 85 (1-2) : 77 - 83
  • [27] Solution Space Optimization for RSA Attack
    Albassam, Nizar N.
    Nasereddin, Mahdi
    2013 SIXTH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE), 2014, : 243 - 246
  • [28] A generalised bound for the Wiener attack on RSA
    Susilo, Willy
    Tonien, Joseph
    Yang, Guomin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [29] A new variant for an attack against RSA signature verification using parameter field
    Oiwa, Yutaka
    Kobara, Kazukuni
    Watanabe, Hajime
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 143 - +
  • [30] Securing RSA Algorithm against Timing Attack
    Arjunan, Amuthan
    Narayanan, Praveena
    Ramu, Kaviarasan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 471 - 476