4 research outputs found

    Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice)

    Get PDF
    In this work we re-examine two common modulus attacks on RSA. First, we show that Guo\u27s continued fraction attack works much better in practice than previously expected. Given three instances of RSA with a common modulus NN and private exponents each smaller than N0.33N^{0.33} the attack can factor the modulus about 93%93\% of the time in practice. The success rate of the attack can be increased up to almost 100%100\% by including a relatively small exhaustive search. Next, we consider Howgrave-Graham and Seifert\u27s lattice-based attack and show that a second necessary condition for the attack exists that limits the bounds (beyond the original bounds) once n≥7n \geq 7 instances of RSA are used. In particular, by construction, the attack can only succeed when the private exponents are each smaller than N0.5−ϵN^{0.5-\epsilon}, given sufficiently many instances, instead of the original bound of N1−ϵN^{1-\epsilon}. In addition, we also consider the effectiveness of the attacks when mounted against multi-prime RSA and Tagaki\u27s variant of RSA. For multi-prime RSA, we show three (or more) instances with a common modulus and private exponents smaller than N1/3−ϵN^{1/3-\epsilon} is unsafe. For Takagi\u27s variant, we show that three or more instances with a common modulus N=prqN=p^rq is unsafe when all the private exponents are smaller than N2/(3(r+1))−ϵN^{2/(3(r+1))-\epsilon}. The results, for both variants, is obtained using Guo\u27s method and are successful almost always with the inclusion of a small exhaustive search. When only two instances are available, Howgrave-Graham and Seifert\u27s attack can be mounted on multi-prime RSA when the private exponents are smaller than N(3+r)/7r−ϵN^{(3+r)/7r-\epsilon} when there are rr primes in the modulus

    On the Security of Some Variants of RSA

    Get PDF
    The RSA cryptosystem, named after its inventors, Rivest, Shamir and Adleman, is the most widely known and widely used public-key cryptosystem in the world today. Compared to other public-key cryptosystems, such as elliptic curve cryptography, RSA requires longer keylengths and is computationally more expensive. In order to address these shortcomings, many variants of RSA have been proposed over the years. While the security of RSA has been well studied since it was proposed in 1977, many of these variants have not. In this thesis, we investigate the security of five of these variants of RSA. In particular, we provide detailed analyses of the best known algebraic attacks (including some new attacks) on instances of RSA with certain special private exponents, multiple instances of RSA sharing a common small private exponent, Multi-prime RSA, Common Prime RSA and Dual RSA

    LIPIcs, Volume 261, ICALP 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 261, ICALP 2023, Complete Volum
    corecore