Low exponent attack against elliptic curve RSA

被引:0
|
作者
Kurosawa, E [1 ]
Okada, K [1 ]
Tsujii, S [1 ]
机构
[1] CHUO UNIV,DEPT INFORMAT SYST ENGN,BUNKYO KU,TOKYO 112,JAPAN
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hastad showed that low exponent RSA is not secure if the same message is encrypted to several receivers. This is true even if time-stamp is used for each receiver. For example, let e = 3. Then if the number of receivers = 7, the eavesdropper can find the plaintext from the seven ciphertexts of each receiver. This paper shows that elliptic curve RSA is not secure in the same scenario. It is shown that the KMOV scheme and Demytko's scheme are not secure if e = 5, n greater than or equal to 2(1024) and the number of receivers = 428. In Demytko's scheme, e can take the value of 2. In this case, this system is not secure if the number of receiver = 11 for n 2 greater than or equal to 2(175).
引用
收藏
页码:376 / 383
页数:8
相关论文
共 50 条
  • [1] LOW EXPONENT ATTACK AGAINST ELLIPTIC CURVE RSA
    KUROSAWA, K
    OKADA, K
    TSUJII, S
    INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 77 - 83
  • [2] An Application of Low Private Exponent Attack on RSA
    Zheng, Yong-Hui
    Zhu, Yue-Fei
    Xu, Hong
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1864 - 1866
  • [3] A new attack on RSA and Demytko's elliptic curve cryptosystem
    Nitaj, Abderrahmane
    Fouotsa, Emmanuel
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (03): : 391 - 409
  • [4] The effectiveness of lattice attacks against low-exponent RSA
    Coupé, C
    Nguyen, P
    Stern, J
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 204 - 218
  • [5] Power attack on small RSA public exponent
    Fouque, Pierre-Alain
    Kunz-Jacques, Sebastien
    Martinet, Gwenaelle
    Muller, Frederic
    Valette, Frederic
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 339 - 353
  • [6] Analysis of Elliptic Curve Cryptography & RSA
    Khan M.R.
    Upreti K.
    Alam M.I.
    Khan H.
    Siddiqui S.T.
    Haque M.
    Parashar J.
    Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
  • [7] Juxtaposition of RSA and Elliptic Curve Cryptosystem
    Soram, Ranbir
    Khomdram, Memeta
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 11 - 21
  • [8] Scan-Based Attack against Elliptic Curve Cryptosystems
    Nara, Ryuta
    Togawa, Nozomu
    Yanagisawa, Masao
    Ohtsuki, Tatsuo
    2010 15TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2010), 2010, : 402 - 407
  • [9] An Improved Power Attack on Small RSA Public Exponent
    Zhao, Bing
    Wang, Lihui
    Jiang, Kun
    Liang, Xiaobing
    Shan, Weijun
    Liu, Jing
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 578 - 581
  • [10] A Unified Framework for Small Secret Exponent Attack on RSA
    Kunihiro, Noboru
    Shinohara, Naoyuki
    Izu, Tetsuya
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (06) : 1285 - 1295