Remarks on the bounds for cryptanalysis of low private key RSA

被引:0
|
作者
Zhou, Haijian [1 ]
Luo, Ping [2 ]
Wang, Daoshun [1 ]
Dai, Yiqi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
关键词
RSA; Cryptanalysis; Low private key; Lattice basis reduction; EXPONENTS; ATTACKS; LLL;
D O I
10.1016/j.pnsc.2008.09.013
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Boneh and Durfee have developed a cryptanalytic algorithm on low private key RSA. The algorithm is based on lattice basis reduction and breaks RSA with private key d < N-0.292. Later on, an improved version by Blomer and May enhanced the efficiency, while reaching approximately this same upper bound. Unfortunately, in both the algorithms, there is a critical error in theoretical analysis, leading to the overestimated upper bound N-0.292. In this paper we present a more precise analytical model, with which the theoretical upper bound on d is modified to approximately d < N-0.277 for ordinary RSA systems with a 1024-bit public key (N,e). (C) 2009 National Natural Science Foundation of China and Chinese Academy of Sciences. Published by Elsevier Limited and Science in China Press. All rights reserved.
引用
收藏
页码:1327 / 1331
页数:5
相关论文
共 50 条
  • [1] Remarks on the bounds for cryptanalysis of low private key RSA
    Haijian Zhou a
    ProgressinNaturalScience, 2009, 19 (10) : 1327 - 1331
  • [2] Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting
    Mefenza, Thierry
    Vergnaud, Damien
    COMPUTER JOURNAL, 2019, 62 (08): : 1194 - 1213
  • [3] Cryptanalysis of RSA with private key d less than N0.292
    Boneh, D
    Durfee, G
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 1 - 11
  • [4] Cryptanalysis of RSA with private key d less than N0.292
    Boneh, D
    Durfee, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1339 - 1349
  • [5] Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices
    Mumtaz, Majid
    Ping, Luo
    INFORMATION SCIENCES, 2020, 538 : 54 - 68
  • [6] RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
    Genkin, Daniel
    Shamir, Adi
    Tromer, Eran
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 444 - 461
  • [7] Cryptanalysis of Prime Power RSA with two private exponents
    Zheng MengCe
    Hu HongGang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 8
  • [8] Cryptanalysis of Prime Power RSA with two private exponents
    ZHENG MengCe
    HU HongGang
    Science China(Information Sciences), 2015, 58 (11) : 59 - 66
  • [9] New Cryptanalysis of Prime Power RSA with Two Private Exponents
    Wang, Shixiong
    Sun, Minghao
    MATHEMATICS, 2024, 12 (21)
  • [10] Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
    Ruzai, Wan Nur Aqlili Wan Mohd
    Nitaj, Abderrahmane
    Ariffin, Muhammad Rezal Kamel
    Mahad, Zahari
    Asbullah, Muhammad Asyraf
    COMPUTER STANDARDS & INTERFACES, 2022, 80