Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices

被引:2
|
作者
Mumtaz, Majid [1 ]
Ping, Luo [1 ]
机构
[1] Tsinghua Univ, Sch Software, Key Lab Informat Syst Secur, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; Common prime RSA; Lattice basis reduction; Coppersmith's method; Experimental study; FINDING SMALL ROOTS; INTEGER POLYNOMIAL EQUATIONS;
D O I
10.1016/j.ins.2020.05.075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Standard RSA cryptosystem becomes vulnerable, when private key d < N-0.292 is used inside CryptoChips of constrained devices, thus an alternate scheme is the Common Prime RSA (CP-RSA) variant, which provides cryptographic (decryption/signing) operations. In this paper, we perform a cryptanalytic attack on CP-RSA using lattice basis reduction method that is used to exploit possible vulnerabilities of RSA small private key attacks. In addition, we performed detail experiments on CP-RSA weak or overestimated bounds and compare results to the past studies. Our implemented cryptanalytic attack implicates more precise and direct method to exploit the CP-RSA existing theoretical and experimental bounds. Also, our results prove that CP-RSA is an effective approach that provides resistance against standard RSA small private key attacks. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:54 / 68
页数:15
相关论文
共 50 条
  • [11] Achieve low power connectivity for IoT devices
    ECN Electron. Compon. News, 11 (20-24):
  • [12] Low Latency Implementations of CNN for Resource-Constrained IoT Devices
    Mujtaba, Ahmed
    Lee, Wai-Kong
    Hwang, Seong Oun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (12) : 5124 - 5128
  • [13] Session Key Derivation for Low Power IoT Devices
    McGinthy, Jason M.
    Michaels, Alan J.
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 194 - 203
  • [14] Lightweight Security Algorithm for Low Power IoT Devices
    Goyal, Tarun Kumar
    Sahula, Vineet
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1725 - 1729
  • [15] Ultra-Low Power and Dependability for IoT Devices
    Henkel, Joerg
    Pagani, Santiago
    Amrouch, Hussam
    Bauer, Lars
    Samie, Farzad
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 954 - 959
  • [16] Low-power, serial interface for power-constrained devices
    Degnan, Brian
    Hasler, Jennifer
    2015 IEEE 58TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2015,
  • [17] Cryptanalysis of Prime Power RSA with two private exponents针对具有2个公私钥对的素数幂RSA体制的密码分析
    MengCe Zheng
    HongGang Hu
    Science China Information Sciences, 2015, 58 : 1 - 8
  • [18] Low-Power Approximate Arithmetic Circuits for IoT Devices
    Thakur, Garima
    Sohal, Harsh
    Jain, Shruti
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2022, 15 (05) : 421 - 428
  • [19] An optimized design strategy and a paradigm for low power IoT devices
    Rajesh, Ammu Lakshmy
    Patrikar, Rajendra
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [20] Providing Confidentiality and Integrity in Ultra Low Power IoT Devices
    Valea, Emanuele
    Da Silva, Mathieu
    Flottes, Marie-Lise
    Di Natale, Giorgio
    Dupuis, Sophie
    Rouzeyre, Bruno
    2019 14TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2019), 2019,