首页> 外文会议>International Conference on Network and System Security >Cryptanalysis of Exhaustive Search on Attacking RSA
【24h】

Cryptanalysis of Exhaustive Search on Attacking RSA

机译:攻击RSA的详尽搜索密码分析

获取原文

摘要

In RSA equation: ed?=?k.Φ(N)?+?1, we may guess on partial bits of d or p?+?q by doing an exhaustive search to further extend the security boundary of d. In this paper, we discuss the following question: Does guessing on p?+?q bring more benefit than guessing on d? We provide the detailed analysis on this problem by using the lattice reduction technique. Our analysis shows that leaking partial most significant bits (MSBs) of p?+?q in RSA risks more than leaking partial MSBs of d. This result inspires us to further extend the boundary of the Boneh-Durfee attack to N 0.284?+?Δ, where "Δ" is contributed by the capability of exhaustive search. Assume that doing an exhaustive search for 64 bits is feasible in the current computational environment, the boundary of the Boneh-Durfee attack should be raised to d?
机译:在RSA方程中:ED?=?K.Φ(n)?+?1,我们可以通过做详尽的搜索来进一步扩展D的安全边界来猜测D或P?+的部分位或P?+。在本文中,我们讨论了以下问题:猜测p?+ q比猜测更多的好处?我们通过使用晶格还原技术提供对该问题的详细分析。我们的分析表明,在RSA风险中泄漏了P?+ Q的部分最高有效位(MSB),而不是D的泄漏部分MSBS。该结果激发了我们进一步将Boneh-Durfee攻击的边界延伸到N 0.284?Δδ,其中“Δ”是通过详尽搜索的能力贡献。假设在当前的计算环境中进行详尽的搜索64位是可行的,对于1024位RSA模量,应将Boneh-Durfee攻击的边界升至D?<?n 0.328。这是Boneh和Durfee边界的37位改善。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号