首页> 外文会议>Australasian conference on information security and privacy >Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference
【24h】

Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference

机译:具有较小素数差异的多素数RSA的改进的分解攻击

获取原文

摘要

In this paper, we study the security of multi-prime RSA with small prime difference and propose two improved factoring attacks. The modulus involved in this variant is the product of r distinct prime factors of same bit-size. Zhang and Takagi (ACISP 2013) showed a Fermat-like factoring attack on multi-prime RSA. In order to improve the previous result, we gather more information about the prime factors to derive r simultaneous modular equations. The first attack is based on combining r equations to solve one multivariate modular equation by a generic lattice approach. Since the equation form is similar to multi-prime -hiding problem, we propose the second attack by applying the optimal linearization technique. We also show that our attacks can achieve better bounds in the experiments.
机译:在本文中,我们研究了具有很小素数差异的多素数RSA的安全性,并提出了两种改进的分解攻击。此变量涉及的模数是相同位大小的r个不同素数的乘积。 Zhang和Takagi(ACISP,2013年)显示了对多基数RSA的类似于Fermat的分解攻击。为了改善先前的结果,我们收集了有关素因子的更多信息,以导出r个联立模块化方程。第一次攻击是基于通过通用格点方法组合r个方程来求解一个多元模块化方程的。由于方程形式类似于多素数隐藏问题,因此我们通过应用最佳线性化技术提出了第二种攻击方案。我们还表明,在实验中我们的攻击可以达到更好的范围。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号