首页> 外文会议>International conference on cryptology in Africa >An Attack on RSA Using LSBs of Multiples of the Prime Factors
【24h】

An Attack on RSA Using LSBs of Multiples of the Prime Factors

机译:使用素数倍数的LSB对RSA的攻击

获取原文

摘要

Let N = pq be an RSA modulus with a public exponent e and a private exponent d. Wiener's famous attack on RSA with d < N~(0.25) and its extension by Boneh and Durfee to d < N~(0.292) show that using a small d makes RSA completely insecure. However, for larger d, it is known that RSA can be broken in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some attacks using additional information encoded in the public exponent e are efficient to factor the RSA modulus. These attacks were later improved and extended in various ways. In this paper, we present a new attack on RSA with a public exponent e satisfying an equation ed- k(N+1-ap-bq) = 1 where a/b is an unknown approximation of q/p. We show that RSA is insecure when certain amount of the Least Significant Bits (LSBs) of ap and bq are known. Further, we show that the existence of good approximations a/b of q/p with small a and b substantially reduces the requirement of LSBs of ap and bq.
机译:令N = pq是具有公共指数e和私有指数d的RSA模数。维纳对d <N〜(0.25)的RSA的著名攻击,以及Boneh和Durfee将其扩展到d <N〜(0.292)的事实表明,使用较小的d会使RSA完全不安全。但是,对于较大的d,已知在特殊条件下RSA可以在多项式时间内被破坏。例如,对RSA的各种部分密钥暴露攻击以及使用公共指数e中编码的其他信息的某些攻击都可以有效地计算出RSA模数。这些攻击后来以各种方式进行了改进和扩展。在本文中,我们提出了一种新的针对RSA的攻击,其公共指数e满足方程ed-k(N + 1-ap-bq)= 1,其中a / b是q / p的未知近似值。我们表明,当已知一定数量的ap和bq的最低有效位(LSB)时,RSA是不安全的。此外,我们表明,存在良好的q / p近似值a / b,且a和b较小,这实质上降低了ap和bq的LSB的要求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号