Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security 2016
DOI: 10.1145/2909827.2930804
|View full text |Cite
|
Sign up to set email alerts
|

Information Hiding in the RSA Modulus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…In 2016, W üller, K ühnel, and Meyer [37] proposed an RSA backdoor called PHP, for "Prime Hiding Prime", in which the information required to factor N is hidden in N itself. The idea is to select a prime p such that q = (p e • p −1 ) mod N is a prime, where (N , e ) is the RSA public key of the designer.…”
Section: Asymmetric Backdoorsmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2016, W üller, K ühnel, and Meyer [37] proposed an RSA backdoor called PHP, for "Prime Hiding Prime", in which the information required to factor N is hidden in N itself. The idea is to select a prime p such that q = (p e • p −1 ) mod N is a prime, where (N , e ) is the RSA public key of the designer.…”
Section: Asymmetric Backdoorsmentioning
confidence: 99%
“…An improvement of PHP, called PHP', is also described in [37]: here, q = (s e • p −1 ) mod N , where s is the concatenation of n/4 random bits and p n/4 . Half of the bits of p are enough to recover the factorization of N thanks to the Coppersmith's attack.…”
Section: Asymmetric Backdoorsmentioning
confidence: 99%
“…In 2016, Wüller, Kühnel, and Meyer [34] proposed a RSA backdoor called PHP, for "Prime Hiding Prime", in which the information required to factor N is hidden in N itself. The idea is to select a prime p such that q = (p e • p −1 ) mod N is a prime, where (N , e ) is the RSA public key of the designer.…”
Section: Asymmetric Backdoorsmentioning
confidence: 99%
“…The idea is to select a prime p such that q = (p e • p −1 ) mod N is a prime, where (N , e ) is the RSA public key of the designer. To factor N = pq, the actor computes N d ≡ N (p • p e • p −1 ) d ≡ N p. An improvement of PHP, called PHP', is also described in [34]: here q = (s e • p −1 ) mod N , where s is the concatenation of n/4 random bits and p n/4 . Half of the bits of p are enough to recover the factorization of N thanks to the Coppersmith's attack.…”
Section: Asymmetric Backdoorsmentioning
confidence: 99%