Low exponent attack against elliptic curve RSA

被引:0
|
作者
Kurosawa, E [1 ]
Okada, K [1 ]
Tsujii, S [1 ]
机构
[1] CHUO UNIV,DEPT INFORMAT SYST ENGN,BUNKYO KU,TOKYO 112,JAPAN
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hastad showed that low exponent RSA is not secure if the same message is encrypted to several receivers. This is true even if time-stamp is used for each receiver. For example, let e = 3. Then if the number of receivers = 7, the eavesdropper can find the plaintext from the seven ciphertexts of each receiver. This paper shows that elliptic curve RSA is not secure in the same scenario. It is shown that the KMOV scheme and Demytko's scheme are not secure if e = 5, n greater than or equal to 2(1024) and the number of receivers = 428. In Demytko's scheme, e can take the value of 2. In this case, this system is not secure if the number of receiver = 11 for n 2 greater than or equal to 2(175).
引用
收藏
页码:376 / 383
页数:8
相关论文
共 50 条
  • [21] RSA and Elliptic Curve Least Significant Bit Security
    Nakamura, Dionathan
    Terada, Routo
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 146 - 161
  • [22] A resource efficient architecture for RSA and elliptic curve cryptosystems
    Wu, Shuhua
    Zhu, Yuefei
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 2356 - 2360
  • [23] Using RSA with low exponent in a public network
    Natl Chung Cheng Univ, Chiayi, Taiwan
    Comput Commun, 3 (284-286):
  • [24] Scan Attack on Elliptic Curve Cryptosystem
    Ali, Sk Subidh
    Sinanoglu, Ozgur
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2015, : 115 - 118
  • [25] Small private-exponent attack on RSA with primes sharing bits
    Zhao, Yao-Dong
    Qi, Wen-Feng
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 221 - +
  • [26] Exclusive exponent blinding is not enough to prevent any timing attack on RSA
    Schindler, Werner
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (02) : 101 - 119
  • [27] Collision-Based Power Attack for RSA with Small Public Exponent
    Itoh, Kouichi
    Yamamoto, Dai
    Yajima, Jun
    Ogata, Wakaha
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 897 - 908
  • [28] Securing RSA Algorithm against Timing Attack
    Arjunan, Amuthan
    Narayanan, Praveena
    Ramu, Kaviarasan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 471 - 476
  • [29] A Weil descent attack against elliptic curve cryptosystems over quartic extension fields
    Arita, Seigo
    Matsuo, Kazuto
    Nagao, Koh-ichi
    Shimura, Mahoro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1246 - 1254
  • [30] RSA and Elliptic Curve Encryption System: A Systematic Literature Review
    Ugbedeojo, Musa
    Adebiyi, Marion O.
    Aroba, Oluwasegun Julius
    Adebiyi, Ayodele Ariyo
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2024, 18 (01)