2018
DOI: 10.3390/cryptography2040036
|View full text |Cite
|
Sign up to set email alerts
|

An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

Abstract: In this paper, we gave an attack on RSA (Rivest–Shamir–Adleman) Cryptosystem when φ(N) has small multiplicative inverse modulo e and the prime sum p + q is of the form p + q = 2nk0 + k1, where n is a given positive integer and k0 and k1 are two suitably small unknown integers using sublattice reduction techniques and Coppersmith’s methods for finding small roots of modular polynomial equations. When we compare this method with an approach using lattice based techniques, this procedure slightly improves the bou… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Some early studies have considered polynomial equations to study low exponent RSA vulnerabilities and their variants [61,62]. Recent number theory-based studies in this domain have focused on lattice reduction (LR) techniques with prime number theory to study RSA key attacks [31,38,39]. Such LR based techniques come under the general category of Coppersmith attacks.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some early studies have considered polynomial equations to study low exponent RSA vulnerabilities and their variants [61,62]. Recent number theory-based studies in this domain have focused on lattice reduction (LR) techniques with prime number theory to study RSA key attacks [31,38,39]. Such LR based techniques come under the general category of Coppersmith attacks.…”
Section: Discussionmentioning
confidence: 99%
“…Most of the recent research has also been focusing on extending the number range upper bound of d and e in the RSA private and public keys by working on the limitation of the Wiener and Coppersmith methods by approaching the problem differently. One recent work [39] considers the prime sum p 1 + p 2 using sublattice reduction techniques and Coppersmith's methods for finding small roots of modular polynomial equations, achieving slight improvement in the upper bound with reduced lattice dimension. Another work [17] uses a small prime difference p 1 − p 2 method which is then developed into a continuous fraction as per Wiener's original method.…”
Section: Introductionmentioning
confidence: 99%
“…In the context of RSA cryptography applications, recent works have considered such known factorization methods to focus on security parameters such as the length of the prime factors p 1 and p 2 , of the RSA modulus n = p 1 p 2 , or other structural properties of the primes. Modifications of existing methods have become popular recently, such as using the prime sum p 1 + p 2 with sublattice reduction techniques and Coppersmith's methods [31] or using a small prime difference p 1 − p 2 method with Wiener's original method [32]. The method by Lenstra's elliptic-curve method also serves as the state-of-the-art proposal for several future studies [33].…”
Section: Related Workmentioning
confidence: 99%