首页> 外文期刊>Journal of mathematical cryptology >Common modulus attacks on small private exponent RSA and some fast variants (in practice)
【24h】

Common modulus attacks on small private exponent RSA and some fast variants (in practice)

机译:对小型私有指数RSA和一些快速变体的通用模数攻击(实际上)

获取原文
获取原文并翻译 | 示例
           

摘要

In this work we re-examine two common modulus attacks on RSA. First, we show that Guo's continued fraction attack works much better in practice than previously expected. Given three instances of RSA with a common modulus N and private exponents each smaller than N~(0.33), the attack can factor the modulus about 93% of the time in practice. The success rate of the attack can be increased up to almost 100% by including a relatively small exhaustive search. Next, we consider Howgrave-Graham and Seifert's lattice-based attack and show that a second necessary condition for the attack exists that limits the bounds (beyond the original bounds) once n ≥ 7 instances of RSA are used. In particular, by construction, the attack is limited to private exponents at most N~(0.5-ε) , given sufficiently many instances, instead of the original bound of N~(1-ε).In addition, we also consider the effectiveness of the attacks when mounted against multi-prime RSA and Takagi's variant of RSA. For multi-prime RSA, we show three (or more) instances with a common modulus and private exponents smaller than N~(1/3-ε) is unsafe. For Takagi's scheme, we show that three or more instances with a common modulus N = p~tq is unsafe when all the private exponents are smaller than N~(2/(3( r+1))-ε). The results, for both variants, is obtained using Guo's method and are almost always successful with the inclusion of a small exhaustive search. When only two instances are available, Howgrave-Graham and Seifert's attack can be successfully mounted on multi-prime RSA, with r primes in the modulus, when the private exponents are both smaller than N~((3+r)/7r)
机译:在这项工作中,我们重新检查对RSA的两种常见的模数攻击。首先,我们证明郭的持续分数攻击在实践中比以前预期的要好得多。给定三个具有共同模数N和私有指数均小于N〜(0.33)的RSA实例,在实践中,攻击可将模数分解为大约93%的时间。通过包括一个相对较小的穷举搜索,攻击的成功率可以提高到几乎100%。接下来,我们考虑Howgrave-Graham和Seifert基于格的攻击,并证明存在第二种必要的攻击条件,一旦使用n≥7个RSA实例,就限制了边界(超出原始边界)。特别地,通过构造,如果有足够多的实例,则攻击仅限于最多N〜(0.5-ε)个私有指数,而不是N〜(1-ε)的原始边界。此外,我们还考虑了有效性针对多原​​始RSA和Takagi的RSA变体的攻击类型。对于多素数RSA,我们显示了三个(或更多)具有共同模数的实例,并且私有指数小于N〜(1 /3-ε)是不安全的。对于Takagi方案,我们表明,当所有私有指数都小于N〜(2 /(3(r + 1))-ε)时,三个或更多具有共同模数N = p〜tq的实例是不安全的。两种变体的结果都是使用Guo的方法获得的,并且通过包含一个详尽的穷举搜索几乎总是成功的。当只有两个实例可用时,当私有指数都小于N〜((3 + r)/ 7r)时,Howgrave-Graham和Seifert的攻击可以成功地在模数为r素数的多素数RSA上进行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号