A new related message attack on RSA

被引:0
|
作者
Yacobi, O
Yacobi, Y
机构
[1] Univ Calif San Diego, Dept Math, La Jolla, CA 92093 USA
[2] Microsoft Res, Redmond, WA 98052 USA
来源
THEORETICAL COMPUTER SCIENCE | 2006年 / 3895卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms x(e) mod N and (ax+b)(e) mod N for known constants a, b is an element of Z(N), one can usually compute x in O(e log(2) e) Z(N)-operations (there axe O(e(2)) messages for which the method fails). We show that given e cryptograms c(i)equivalent to(a(i)x+b(i))(e) mod N, i=0, 1,...e-1, for any known constants a(i), b(i) is an element of Z(N), one can deterministically compute x in O(e) Z(N)-operations that depend on the cryptograms, after a pre-processing that depends only on the constants. The complexity of the pre-processing is O(e log(2) e) Z(N)-operations, and can be amortized over many instances. We also consider a special case where the overall cost of the attack is O(e) Z(N)-operations. Our tools are borrowed from numerical-analysis and adapted to handle formal polynomials over finite-rings. To the best of our knowledge their use in cryptanalysis is novel.
引用
收藏
页码:187 / 195
页数:9
相关论文
共 50 条
  • [41] On an attack on RSA with small CRT-exponents
    Han LiDong
    Wang XiaoYun
    Xu GuangWu
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (08) : 1511 - 1518
  • [42] Implicit-Key Attack on the RSA Cryptosystem
    Zheng, Mengce
    Hu, Honggang
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 354 - 362
  • [43] Permanent fault attack on the parameters of RSA with CRT
    Yen, SM
    Moon, S
    Ha, J
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 285 - 296
  • [44] RSA-padding signatures with attack studies
    Stephanides, George
    Constantinescu, Nicolae
    Cosulschi, Mirel
    Gabroveanu, Mihai
    WEBIST 2006: Proceedings of the Second International Conference on Web Information Systems and Technologies: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 97 - 100
  • [45] Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
    Berson, TA
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 213 - 220
  • [46] A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based
    Kaedi, S.
    Doostari, M. A.
    Ghaznavi-Ghoushchi, M. B.
    Yusefi, H.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (03)
  • [47] New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method
    Ariffin, Muhammad Rezal Kamel
    Abubakar, Saidu Isah
    Yunos, Faridah
    Asbullah, Muhammad Asyraf
    CRYPTOGRAPHY, 2019, 3 (01) : 1 - 25
  • [48] Message Blinding Method Requiring No Multiplicative Inversion for RSA
    Kim, Heeseok
    Han, Dong-Guk
    Hong, Seokhie
    Ha, Jaecheol
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2014, 13 (04)
  • [49] The Wiener Attack on RSA Revisited: A Quest for the Exact Bound
    Susilo, Willy
    Tonien, Joseph
    Yang, Guomin
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 381 - 398
  • [50] An Improved Power Attack on Small RSA Public Exponent
    Zhao, Bing
    Wang, Lihui
    Jiang, Kun
    Liang, Xiaobing
    Shan, Weijun
    Liu, Jing
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 578 - 581