The Attack of the RSA Subgroup Assumption

被引:0
|
作者
Weng, Jiang [1 ,2 ]
Dou, Yun-Qi [1 ,2 ]
Ma, Chuan-Gui [1 ,2 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
RSA moduli; hidden order; subgroup; cryptanalysis; semi-smooth RSA; INTERPOLATION; COMPUTATION; EFFICIENT; TRANSFORM; POINTS; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In TCC 2005, Groth proposed the cryptographic usefulness of a small subgroup G of Z(N)*. of hidden order. So far, the best attack of previous method for a subgroup of Z(N)* had a complexity about O(root p'). In this paper, we propose the interval and the double walks method to speed up the computation of the semi-smooth RSA subgroup problem. Our new algorithm reduces the complexity to O(root p'/2) rather than O(root p'). Besides the theoretical analysis, we also compare the performances of our new algorithm with the previous algorithm in experiments, and the efficiency of our new algorithm is approach to 50% faster than the previous.
引用
收藏
页码:597 / 610
页数:14
相关论文
共 50 条
  • [21] A cycling-like attack on RSA
    Zheng, Yonghui
    Zhu, Yuefei
    Xu, Hong
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (12): : 56 - 58
  • [22] A generalized attack on RSA type cryptosystems
    Bunder, Martin
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    THEORETICAL COMPUTER SCIENCE, 2017, 704 : 74 - 81
  • [23] A new related message attack on RSA
    Yacobi, O
    Yacobi, Y
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 1 - 8
  • [24] A variant of Wiener's attack on RSA
    Dujella, Andrej
    COMPUTING, 2009, 85 (1-2) : 77 - 83
  • [25] Solution Space Optimization for RSA Attack
    Albassam, Nizar N.
    Nasereddin, Mahdi
    2013 SIXTH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE), 2014, : 243 - 246
  • [26] A new attack on some RSA variants
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    THEORETICAL COMPUTER SCIENCE, 2023, 960
  • [27] A generalised bound for the Wiener attack on RSA
    Susilo, Willy
    Tonien, Joseph
    Yang, Guomin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [28] A Multi-trapdoor Commitment Scheme from the RSA Assumption
    Nishimaki, Ryo
    Fujisaki, Eiichiro
    Tanaka, Keisuke
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 182 - +
  • [29] Removing the Strong RSA Assumption from Arguments over the Integers
    Couteau, Geoffroy
    Peters, Thomas
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 321 - 350
  • [30] A Multi-Trapdoor Commitment Scheme from the RSA Assumption
    Nishimaki, Ryo
    Fujisaki, Eiichiro
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 176 - 184