A new related message attack on RSA

被引:0
|
作者
Yacobi, O
Yacobi, Y
机构
[1] Univ Calif San Diego, Dept Math, La Jolla, CA 92093 USA
[2] Microsoft Res, Redmond, WA 98052 USA
来源
THEORETICAL COMPUTER SCIENCE | 2006年 / 3895卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms x(e) mod N and (ax+b)(e) mod N for known constants a, b is an element of Z(N), one can usually compute x in O(e log(2) e) Z(N)-operations (there axe O(e(2)) messages for which the method fails). We show that given e cryptograms c(i)equivalent to(a(i)x+b(i))(e) mod N, i=0, 1,...e-1, for any known constants a(i), b(i) is an element of Z(N), one can deterministically compute x in O(e) Z(N)-operations that depend on the cryptograms, after a pre-processing that depends only on the constants. The complexity of the pre-processing is O(e log(2) e) Z(N)-operations, and can be amortized over many instances. We also consider a special case where the overall cost of the attack is O(e) Z(N)-operations. Our tools are borrowed from numerical-analysis and adapted to handle formal polynomials over finite-rings. To the best of our knowledge their use in cryptanalysis is novel.
引用
收藏
页码:187 / 195
页数:9
相关论文
共 50 条
  • [31] On the improvement of the BDF attack on LSBS-RSA
    Sun, Hung-Min
    Wu, Mu-En
    Wang, Huaxiong
    Guo, Jian
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 84 - +
  • [32] Power attack on small RSA public exponent
    Fouque, Pierre-Alain
    Kunz-Jacques, Sebastien
    Martinet, Gwenaelle
    Muller, Frederic
    Valette, Frederic
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 339 - 353
  • [33] On an attack on RSA with small CRT-exponents
    HAN LiDong 1
    2 School of Mathematics
    3 Institute for Advanced Study
    4 Department of Electrical Engineering and Computer Science
    ScienceChina(InformationSciences), 2010, 53 (08) : 1511 - 1518
  • [34] A practical timing attack on RSA over a LAN
    Lodato, Mark J.
    Jouny, Ismail
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [35] An Application of Low Private Exponent Attack on RSA
    Zheng, Yong-Hui
    Zhu, Yue-Fei
    Xu, Hong
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1864 - 1866
  • [36] Another generalization of Wiener's attack on RSA
    Nitaj, Abderrahmane
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 174 - 190
  • [37] On an attack on RSA with small CRT-exponents
    LiDong Han
    XiaoYun Wang
    GuangWu Xu
    Science China Information Sciences, 2010, 53 : 1511 - 1518
  • [38] Hardware fault attack on RSA with CRT revisited
    Yen, SM
    Moon, S
    Ha, JC
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 374 - 388
  • [39] Fault-Based Attack of RSA Authentication
    Pellegrini, Andrea
    Bertacco, Valeria
    Austin, Todd
    2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 2010, : 855 - 860
  • [40] Perturbating RSA public keys: An improved attack
    Berzati, Alexandre
    Canovas, Cecile
    Goubin, Louis
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 380 - +