首页> 外文期刊>The international arab journal of information technology >Ciphertext-Only Attack on RSA Using Lattice Basis Reduction
【24h】

Ciphertext-Only Attack on RSA Using Lattice Basis Reduction

机译:仅使用晶格基础对RSA进行密文攻击

获取原文
获取原文并翻译 | 示例
           

摘要

We use lattice basis reduction for ciphertext-only attack on RSA. Our attack is applicable in the conditions when known attacks are not applicable, and, contrary to known attacks, it does not require prior knowledge of a part of a message or key, small encryption key, e , or message broadcasting. Our attack is successful when a vector, comprised of a message and its exponent, is likely to be the shortest in the lattice, and meets Minkowski's Second Theorem bound. We have conducted experiments for message, keys, and encryption/decryption keys with sizes from 40 to 8193 bits, with dozens of thousands of successful RSA cracks. It took about 45 seconds for cracking 2001 messages of 2050 bits and for large public key values related with Euler's totient function, and the same order private keys. Based on our findings, for RSA not to be susceptible to the proposed attack, it is recommended avoiding RSA public key form used in our experiments.
机译:我们对RSA的密文攻击仅使用晶格基础。我们的攻击适用于当已知攻击不适用的情况下,并且与已知攻击相反,它不需要先验知识的消息或密钥,小加密密钥,E或消息广播的一部分。当一个由消息及其指数组成的传染媒介可能是格子中最短的传染媒介时,我们的攻击是成功的,并且符合Minkowski的第二个定理界定。我们对消息,键和加密/解密密钥进行了实验,尺寸从40到8193位,数千次成功的RSA裂缝。裂解2050位的消息和与欧拉的职业函数有关的大型公钥值以及相同的私钥,它花了大约45秒。基于我们的研究结果,对于RSA不容易受到建议的攻击,建议避免在我们的实验中使用的RSA公共关键表格。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号