Bulk GCD Computation Using a GPU to Break Weak RSA Keys

被引:5
|
作者
Fujita, Toru [1 ]
Nakano, Koji [1 ]
Ito, Yasuaki [1 ]
机构
[1] Hiroshima Univ, Dept Informat Engn, Kagamiyama 1-4-1, Higashihiroshima 7398527, Japan
关键词
MEMORY MACHINE; ALGORITHMS;
D O I
10.1109/IPDPSW.2015.54
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RSA is one the most well-known public-key cryptosystems widely used for secure data transfer. An RSA encryption key includes a modulus n which is the product of two large prime numbers p and q. If an RSA modulus n can be decomposed into p and q, the corresponding decryption key can be computed easily from them and the original message can be obtained using it. RSA cryptosystem relies on the hardness of factorization of RSA modulus. Suppose that we have a lot of encryption keys collected from the Web. If some of them are inappropriately generated so that they share the same prime number, then they can be decomposed by computing their GCD (Greatest Common Divisor). Actually, a previously published investigation showed that a certain ratio of RSA moduli in encryption keys in the Web are sharing prime numbers. We may find such weak RSA moduli n by computing the GCD of many pairs of RSA moduli. The main contribution of this paper is to present a new Euclidean algorithm for computing the GCD of all pairs of encryption moduli. The idea of our new Euclidean algorithm that we call Approximate Euclidean algorithm is to compute an approximation of quotient by just one 64-bit division and to use it for reducing the number of iterations of the Euclidean algorithm. We also present an implementation of Approximate Euclidean algorithm optimized for CUDA-enabled GPUs. The experimental results show that our implementation for 1024-bit GCD on GeForce GTX 780Ti runs more than 80 times faster than the Intel Xeon CPU implementation. Further, our GPU implementation is more than 9 times faster than the best known published GCD computation using the same generation GPU.
引用
收藏
页码:385 / 394
页数:10
相关论文
共 50 条
  • [1] New Weak Keys in RSA
    WANG Baocang~ 1
    2. College of Computer Information Engineering
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1529 - 1532
  • [2] NEW WEAK RSA KEYS
    Nitaj, Abderrahmane
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2011, 23 (02): : 131 - 148
  • [3] Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys
    Janovsky, Adam
    Nemec, Matus
    Svenda, Petr
    Sekan, Peter
    Matyas, Vashek
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 505 - 524
  • [4] An evaluation of the RSA private keys and the presence of weak keys
    Almazari, Mahmoud M.
    Taqieddin, Eyad
    Shatnawi, Ahmed S.
    Al-Shara, Zakarea
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (08): : 2273 - 2284
  • [5] Weak RSA Keys Discovery on GPGPU
    Karbownik, Przemyslaw
    Russek, Pawel
    Wiatr, Kazimierz
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2019, 65 (01) : 25 - 31
  • [6] Parallel computation of the generating keys for RSA cryptosystems
    Chang, CC
    Hwang, MS
    ELECTRONICS LETTERS, 1996, 32 (15) : 1365 - 1366
  • [7] RSA Weak Public Keys Available on the Internet
    Barbulescu, Mihai
    Stratulat, Adrian
    Traista-Popescu, Vlad
    Simion, Emil
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 92 - 102
  • [8] Reducing the Complexity in the Distributed Computation of Private RSA Keys
    Lory, Peter
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 250 - 263
  • [9] Weak keys in RSA over the work of Blomer & May
    Padhye, S. (sahadeo-mathrsu@yahoo.com), 1600, Femto Technique Co., Ltd. (14):
  • [10] Revisiting Wiener's attack - New weak keys in RSA
    Maitra, Subhamoy
    Sarkar, Santanu
    INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 228 - 243