Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices

被引:2
|
作者
Mumtaz, Majid [1 ]
Ping, Luo [1 ]
机构
[1] Tsinghua Univ, Sch Software, Key Lab Informat Syst Secur, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; Common prime RSA; Lattice basis reduction; Coppersmith's method; Experimental study; FINDING SMALL ROOTS; INTEGER POLYNOMIAL EQUATIONS;
D O I
10.1016/j.ins.2020.05.075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Standard RSA cryptosystem becomes vulnerable, when private key d < N-0.292 is used inside CryptoChips of constrained devices, thus an alternate scheme is the Common Prime RSA (CP-RSA) variant, which provides cryptographic (decryption/signing) operations. In this paper, we perform a cryptanalytic attack on CP-RSA using lattice basis reduction method that is used to exploit possible vulnerabilities of RSA small private key attacks. In addition, we performed detail experiments on CP-RSA weak or overestimated bounds and compare results to the past studies. Our implemented cryptanalytic attack implicates more precise and direct method to exploit the CP-RSA existing theoretical and experimental bounds. Also, our results prove that CP-RSA is an effective approach that provides resistance against standard RSA small private key attacks. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:54 / 68
页数:15
相关论文
共 50 条
  • [1] Improved Results on Cryptanalysis of Prime Power RSA
    Peng, Liqiang
    Hu, Lei
    Lu, Yao
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 287 - 303
  • [2] Cryptanalysis of Prime Power RSA with two private exponents
    Zheng MengCe
    Hu HongGang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 8
  • [3] Cryptanalysis of Prime Power RSA with two private exponents
    ZHENG MengCe
    HU HongGang
    Science China(Information Sciences), 2015, 58 (11) : 59 - 66
  • [4] Remarks on the bounds for cryptanalysis of low private key RSA
    Zhou, Haijian
    Luo, Ping
    Wang, Daoshun
    Dai, Yiqi
    PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2009, 19 (10) : 1327 - 1331
  • [5] Remarks on the bounds for cryptanalysis of low private key RSA
    Haijian Zhou a
    ProgressinNaturalScience, 2009, 19 (10) : 1327 - 1331
  • [6] New Cryptanalysis of Prime Power RSA with Two Private Exponents
    Wang, Shixiong
    Sun, Minghao
    MATHEMATICS, 2024, 12 (21)
  • [7] Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach
    Ravva, Santosh Kumar
    Krishna, Sureddi R. M.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 377 - 389
  • [8] A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices
    Suarez-Albela, Manuel
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    Castedo, Luis
    2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, : 246 - 251
  • [9] Power Supply Duty Cycling for Highly Constrained IoT Devices
    Monti, A.
    Alata, E.
    Takacs, A.
    Dragomirescu, D.
    CAS 2018 PROCEEDINGS: 2018 INTERNATIONAL SEMICONDUCTOR CONFERENCE, 2018, : 215 - 218
  • [10] Efficient Security Algorithm for Power-Constrained IoT Devices
    Mamvong, Joseph N.
    Goteng, Gokop L.
    Zhou, Bo
    Gao, Yue
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5498 - 5509