【24h】

Cryptanalysis of Unbalanced RSA with Small CRT-Exponent

机译:具有小CRT指数的不平衡RSA的密码分析

获取原文
获取原文并翻译 | 示例

摘要

We present lattice-based attacks on RSA with prime factors p and q of unbalanced size. In our scenario, the factor q is smaller than N~β and the decryption exponent d is small modulo p - 1. We introduce two approaches that both use a modular bivariate polynomial equation with a small root. Extracting this root is in both methods equivalent to the factorization of the modulus N = pq. Applying a method of Coppersmith, one can construct from a bivariate modular equation a bivariate polynomial f(x,y) over Z that has the same small root. In our first method, we prove that one can extract the desired root of f(x,y) in polynomial time. This method works up to β < (3-5~(1/2))/2 ≈ 0.382. Our second method uses a heuristic to find the root. This method improves upon the first one by allowing larger values of d modulo p - 1 provided that β ≤ 0.23.
机译:我们介绍了针对RSA的基于格的攻击,其中素数p和q不平衡。在我们的场景中,因子q小于N〜β,解密指数d为p-1模。我们介绍了两种方法,它们都使用具有较小根的模块化双变量多项式方程。在两种方法中,提取此根均等于模量N = pq的因式分解。应用Coppersmith的方法,可以从二元模数方程构造Z上具有相同小根的二元多项式f(x,y)。在我们的第一种方法中,我们证明了可以在多项式时间内提取f(x,y)的期望根。该方法的工作范围为β<(3-5〜(1/2))/ 2≈0.382。我们的第二种方法使用启发式来找到根。该方法通过允许更大的d模p-1值(β≤0.23)对第一方法进行改进。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号