Partial key exposure attacks on RSA up to full size exponents

作者: Matthias Ernst , Ellen Jochemsz , Alexander May , Benne de Weger

DOI: 10.1007/11426639_22

关键词:

摘要: We present several attacks on RSA that factor the modulus in polynomial time under condition a fraction of most significant bits or least private exponent is available to attacker. Our new are first this type work up full size public exponent.

参考文章(12)
Alexander May, Cryptanalysis of Unbalanced RSA with Small CRT-Exponent Advances in Cryptology — CRYPTO 2002. pp. 242- 256 ,(2002) , 10.1007/3-540-45708-9_16
Johannes Blömer, Alexander May, New Partial Key Exposure Attacks on RSA Advances in Cryptology - CRYPTO 2003. pp. 27- 43 ,(2003) , 10.1007/978-3-540-45146-4_2
Alexander May, Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring Advances in Cryptology – CRYPTO 2004. pp. 213- 219 ,(2004) , 10.1007/978-3-540-28628-8_13
Nicholas Howgrave-Graham, Finding Small Roots of Univariate Modular Equations Revisited Lecture Notes in Computer Science. pp. 131- 142 ,(1997) , 10.1007/BFB0024458
Jean-Sébastien Coron, Finding Small Roots of Bivariate Integer Polynomial Equations Revisited theory and application of cryptographic techniques. pp. 492- 505 ,(2004) , 10.1007/978-3-540-24676-3_29
D. Boneh, G. Durfee, Cryptanalysis of RSA with private key d less than N/sup 0.292/ IEEE Transactions on Information Theory. ,vol. 46, pp. 1339- 1349 ,(2000) , 10.1109/18.850673
Don Coppersmith, Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities Journal of Cryptology. ,vol. 10, pp. 233- 260 ,(1997) , 10.1007/S001459900030
A. K. Lenstra, H. W. Lenstra, L. Lovász, Factoring Polynomials with Rational Coefficients Mathematische Annalen. ,vol. 261, pp. 515- 534 ,(1982) , 10.1007/BF01457454
Benne de Weger, Cryptanalysis of RSA with small prime difference Applicable Algebra in Engineering, Communication and Computing. ,vol. 13, pp. 17- 28 ,(2002) , 10.1007/S002000100088
M.J. Wiener, Cryptanalysis of short RSA secret exponents IEEE Transactions on Information Theory. ,vol. 36, pp. 553- 558 ,(1990) , 10.1109/18.54902