Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions

作者: Santanu Sarkar , Sourav Sen Gupta , Subhamoy Maitra

DOI: 10.1007/978-3-642-17401-8_2

关键词:

摘要: Consider the RSA public key cryptosystem with parameters N = pq, q < p 2q, encryption exponent e and private decryption d. In this paper, cryptanalysis of is studied given that some amount Most Significant Bits (MSBs) d exposed. Eurocrypt 2005, a lattice based attack on problem was proposed by Ernst, Jochemsz, May de Weger. we present variant their method which provides better experimental results depending practical values We also propose sublattice structure improves significantly for smaller exponents.

参考文章(31)
Public Key Cryptography - PKC 2009 Lecture Notes in Computer Science. ,vol. 5443, ,(2009) , 10.1007/978-3-642-00468-1
Johannes Blömer, Alexander May, New Partial Key Exposure Attacks on RSA Advances in Cryptology - CRYPTO 2003. pp. 27- 43 ,(2003) , 10.1007/978-3-540-45146-4_2
Jens Groth, Aggelos Kiayias, Helger Lipmaa, Multi-query computationally-private information retrieval with constant communication rate public key cryptography. pp. 107- 123 ,(2010) , 10.1007/978-3-642-13013-7_7
Yoshinori Aono, A New Lattice Construction for Partial Key Exposure Attack for RSA Public Key Cryptography – PKC 2009. pp. 34- 53 ,(2009) , 10.1007/978-3-642-00468-1_3
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
Jean-Sébastien Coron, Finding Small Roots of Bivariate Integer Polynomial Equations Revisited theory and application of cryptographic techniques. pp. 492- 505 ,(2004) , 10.1007/978-3-540-24676-3_29
Matthias Ernst, Ellen Jochemsz, Alexander May, Benne de Weger, Partial key exposure attacks on RSA up to full size exponents theory and application of cryptographic techniques. pp. 371- 386 ,(2005) , 10.1007/11426639_22
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017