首页> 外文会议>International Conference on the Theory and Application of Cryptology and Security >Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99
【24h】

Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99

机译:来自亚洲秘密指数的RSA计划的密码分析

获取原文

摘要

At Asiacrypt '99, Sun, Yang and Laih proposed three RSA variants with short secret exponent that resisted all known attacks, including the recent Boneh-Durfee attack from Eurocrypt '99 that improved Wiener's attack on RSA with short secret exponent. The resistance comes from the use of unbalanced primes and. In this paper, we extend the Boneh-Durfee attack to break two out of the three proposed variants. While the Boneh-Durfee attack was based on Coppersmith's lattice-based technique for finding small roots to bivariate modular polynomial equations, our attack is based on its generalization to trivariate modular polynomial equations. The attack is heuristic but works well in practice, as the Boneh-Durfee attack. In particular, we were able to break in a few minutes the numerical examples proposed by Sun, Yang and Laih. The results illustrate once again the fact that one should be very cautious when using short secret exponent with RSA.
机译:在亚洲,阳光,杨和莱赫提出了三个RSA变体,其中短秘密指数抵抗了所有已知的攻击,包括来自Eurocrypt'99的最近的Boneh-Curefee攻击,改善了Wiener对RSA的攻击,简短秘密指数。电阻来自使用不平衡的素数和。在本文中,我们延长了Boneh-Curefee攻击,以打破三种提出的变体中的两个。虽然Boneh-Durfee攻击基于Coppersmith的基于格子的基于格子的技术,但我们的攻击基于其跨越模块化多项式方程的泛化。袭击是启发式,但在实践中运作良好,作为Boneh-Durfee攻击。特别是,我们能够在几分钟内突破太阳,杨和莱赫提出的数值例子。结果再次说明了一次应该非常谨慎地使用RSA时非常谨慎。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号