Low exponent attack against elliptic curve RSA

被引:0
|
作者
Kurosawa, E [1 ]
Okada, K [1 ]
Tsujii, S [1 ]
机构
[1] CHUO UNIV,DEPT INFORMAT SYST ENGN,BUNKYO KU,TOKYO 112,JAPAN
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hastad showed that low exponent RSA is not secure if the same message is encrypted to several receivers. This is true even if time-stamp is used for each receiver. For example, let e = 3. Then if the number of receivers = 7, the eavesdropper can find the plaintext from the seven ciphertexts of each receiver. This paper shows that elliptic curve RSA is not secure in the same scenario. It is shown that the KMOV scheme and Demytko's scheme are not secure if e = 5, n greater than or equal to 2(1024) and the number of receivers = 428. In Demytko's scheme, e can take the value of 2. In this case, this system is not secure if the number of receiver = 11 for n 2 greater than or equal to 2(175).
引用
收藏
页码:376 / 383
页数:8
相关论文
共 50 条
  • [41] Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks
    Kardi, Amine
    Zagrouba, Rachid
    Alqahtani, Mohammed
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [42] Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    Coppersmith, D
    JOURNAL OF CRYPTOLOGY, 1997, 10 (04) : 233 - 260
  • [43] The multi-dimension RSA and its low exponent security
    曹珍富
    Science in China(Series E:Technological Sciences), 2000, (04) : 349 - 354
  • [44] The multi-dimension RSA and its low exponent security
    Zhenfu Cao
    Science in China Series E: Technological Sciences, 2000, 43 : 349 - 354
  • [45] Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
    Don Coppersmith
    Journal of Cryptology, 1997, 10 : 233 - 260
  • [46] The multi-dimension RSA and its low exponent security
    Cao, ZF
    SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 2000, 43 (04): : 349 - 354
  • [47] Securing Elliptic Curve Based EI-Gamal Against Pollard Rho Attack Using Elliptic Curve Based Diffie-Hellman Key Exchange
    Zani, Tafta
    Barmawi, Ari Moesriami
    Abdurohman, Maman
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 505 - 512
  • [48] Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
    Sajjad, Anum
    Afzal, Mehreen
    Iqbal, Waseem
    Abbas, Haider
    Latif, Rabia
    Raza, Rana Aamir
    IEEE ACCESS, 2020, 8 : 139903 - 139917
  • [49] Research on Single-Exponent Multiple-Data Attack on RSA Cipher Circuits
    Li, Zhi-yuan
    Gao, Hai-kuo
    Rong, Kun
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1947 - 1950
  • [50] Chosen-Message Exponent Extraction against RSA Hardware Implementation
    Chen Ai-dong
    Wang Fei-yan
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 314 - +