2020
DOI: 10.1142/s0129054120500045
|View full text |Cite
|
Sign up to set email alerts
|

A Unified Method for Private Exponent Attacks on RSA Using Lattices

Abstract: Let [Formula: see text] be an RSA public key with private exponent [Formula: see text] where [Formula: see text] and [Formula: see text] are large primes of the same bit size. At Eurocrypt 96, Coppersmith presented a polynomial-time algorithm for finding small roots of univariate modular equations based on lattice reduction and then succussed to factorize the RSA modulus. Since then, a series of attacks on the key equation [Formula: see text] of RSA have been presented. In this paper, we show that many of such… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 23 publications
(54 reference statements)
0
3
0
Order By: Relevance
“…There are more factoring techniques, but they require more knowledge of cryptosystems or specific requirements for the prime factors (see [1,3,4,19]). Utilizing highperformance-Computing systems such as multicore systems [6,7,13,15], cloud computing systems [28], and graphics processing units [2,8] is one method for accelerating factoring algorithms.…”
Section: Of 11mentioning
confidence: 99%
“…There are more factoring techniques, but they require more knowledge of cryptosystems or specific requirements for the prime factors (see [1,3,4,19]). Utilizing highperformance-Computing systems such as multicore systems [6,7,13,15], cloud computing systems [28], and graphics processing units [2,8] is one method for accelerating factoring algorithms.…”
Section: Of 11mentioning
confidence: 99%
“…Therefore, solving this problem in an efficient timeframe leads to breaking the RSA. In other side, the difficulty in finding a polynomial time for the factorization leads to difficulty in breaking the RSA cryptosystem [6,7,8,9]. Moreover, the integer factorization problem is important from the point of view of complexity theory.…”
Section: = Modmentioning
confidence: 99%
“…In order to unify small private exponent attacks on RSA and to determine a universal attack using continued fractions or lattices, the authors in [14,15] proposed concepts of the Wiener and Coppersmith intervals using continued fractions and lattices, respectively. An integer interval I is called Wiener's interval if each m ∈ I satisfies Wiener's attack, i.e.,…”
mentioning
confidence: 99%