作者: Nadia Heninger , Hovav Shacham
DOI: 10.1007/978-3-642-03356-8_1
关键词: Public-key cryptography 、 Public exponent 、 Mathematics 、 Key size 、 Cold boot attack 、 Reboot 、 Theoretical computer science 、 Running time
摘要: We show that an RSA private key with small public exponent can be efficiently recovered given a 0.27 fraction of its bits at random. An important application this work is to the "cold boot" attacks Halderman et al. make new observations about structure keys allow our algorithm use redundant information in typical storage format key. Our itself elementary and does not lattice techniques used other reconstruction problems. give analysis running time behavior matches threshold phenomenon observed experiments.