2018
DOI: 10.3390/cryptography3010002
|View full text |Cite
|
Sign up to set email alerts
|

New Cryptanalytic Attack on RSA Modulus N=pq Using Small Prime Difference Method

Abstract: This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = pq in polynomial time. The paper has two parts. In the first part, we report the usage of the small prime difference method of the form |b 2 p − a 2 q| < N γ where the ratio of. The second part of the paper reports four cryptanalytic attacks on t instances of RSA moduli N s = p s q s for s = 1, 2, . . . , t where we use N − a 2 +b 2 ab √ N + 1 as an approximation of φ(N) satisfying… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
15
1
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 13 publications
1
15
1
1
Order By: Relevance
“…Therefore, predicting the number of control individuals in the next generation based on the quality of the metamodel which is calculated for the current generation, may be erroneous. The rank correlation prank (Ariffin et al, 2019) is used as the criteria for assessing the quality of the metamodel which depends on the difference in the ranks (numbers in the sorted by the FP list) of individuals who are calculated using the objective function. If it were possible to first assess the quality of the metamodel in the current generation and then use this estimate to determine the controlled individuals in the same generation, then this method could be effectively used to correctly select the individuals in the next generation.…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, predicting the number of control individuals in the next generation based on the quality of the metamodel which is calculated for the current generation, may be erroneous. The rank correlation prank (Ariffin et al, 2019) is used as the criteria for assessing the quality of the metamodel which depends on the difference in the ranks (numbers in the sorted by the FP list) of individuals who are calculated using the objective function. If it were possible to first assess the quality of the metamodel in the current generation and then use this estimate to determine the controlled individuals in the same generation, then this method could be effectively used to correctly select the individuals in the next generation.…”
Section: Resultsmentioning
confidence: 99%
“…In the context of RSA cryptography applications, recent works have considered such known factorization methods to focus on security parameters such as the length of the prime factors p 1 and p 2 , of the RSA modulus n = p 1 p 2 , or other structural properties of the primes. Modifications of existing methods have become popular recently, such as using the prime sum p 1 + p 2 with sublattice reduction techniques and Coppersmith's methods [31] or using a small prime difference p 1 − p 2 method with Wiener's original method [32]. The method by Lenstra's elliptic-curve method also serves as the state-of-the-art proposal for several future studies [33].…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, this might render RSA insecure. Indeed, in 1990, Wiener's work [24] indicated that the RSA modulus N can be factored if d < 1 3 N 0.25 by the continued fraction attack. Using Coppersmith's technique and lattice reduction, [3] enhanced the attack range up to d < N 0.292 .…”
Section: Introductionmentioning
confidence: 99%