8 research outputs found

    鍵の部分情報の漏洩に対するRSA暗号の安全性解析

    Get PDF
    University of Tokyo(東京大学

    Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting

    Get PDF
    International audienceWe analyze the security and the efficiency of interactive protocols where a client wants to delegate the computation of an RSA signature given a public key, a public message and the secret signing exponent. We consider several protocols where the secret exponent is splitted using some algebraic decomposition. We first provide an exhaustive analysis of the delegation protocols in which the client outsources a single RSA exponentiation to the server. We then revisit the security of the protocols RSA-S1 and RSA-S2 that were proposed by Matsumoto, Kato and Imai in 1988. We present an improved lattice-based attack on RSA-S1 and we propose a simple variant of this protocol that provides better efficiency for the same security level. Eventually, we present the first attacks on the protocol RSA-S2 that employs the Chinese Remainder Theorem to speed up the client's computation. The efficiency of our (heuristic) attacks has been validated experimentally

    Minkowski sum based lattice construction for multivariate simultaneous Coppersmith\u27s technique and applications to RSA

    Get PDF
    We investigate a lattice construction method for the Coppersmith technique for finding small solutions of a modular equation. We consider its variant for simultaneous equations and propose a method to construct a lattice by combining lattices for solving single equations. As applications, we consider a new RSA cryptanalyses. Our algorithm can factor an RSA modulus from 2\ell \ge 2 pairs of RSA public exponents with the common modulus corresponding to secret exponents smaller than N(95)/(12+4)N^{(9\ell -5)/(12\ell + 4)}, which improves on the previously best known result by Sarkar and Maitra. For partial key exposure situation, we also can factor the modulus if βδ/2+1/4<(31)(3+1)\beta - \delta/2 + 1/4 < (3\ell-1)(3\ell + 1), where β\beta and δ\delta are bit-lengths /logN/ \log N of the secret exponent and its exposed LSBs, respectively

    Partial Key Exposure Attack on Short Secret Exponent CRT-RSA

    Get PDF
    Let (N,e)(N,e) be an RSA public key, where N=pqN=pq is the product of equal bitsize primes p,qp,q. Let dp,dqd_p, d_q be the corresponding secret CRT-RSA exponents. Using a Coppersmith-type attack, Takayasu, Lu and Peng (TLP) recently showed that one obtains the factorization of NN in polynomial time, provided that dp,dqN0.122d_p, d_q \leq N^{0.122}. Building on the TLP attack, we show the first Partial Key Exposure attack on short secret exponent CRT-RSA. Namely, let N0.122dp,dqN0.5N^{0.122} \leq d_p, d_q \leq N^{0.5}. Then we show that a constant known fraction of the least significant bits (LSBs) of both dp,dqd_p, d_q suffices to factor NN in polynomial time. Naturally, the larger dp,dqd_p,d_q, the more LSBs are required. E.g. if dp,dqd_p, d_q are of size N0.13N^{0.13}, then we have to know roughly a 15\frac 1 5-fraction of their LSBs, whereas for dp,dqd_p, d_q of size N0.2N^{0.2} we require already knowledge of a 23\frac 2 3-LSB fraction. Eventually, if dp,dqd_p, d_q are of full size N0.5N^{0.5}, we have to know all of their bits. Notice that as a side-product of our result we obtain a heuristic deterministic polynomial time factorization algorithm on input (N,e,dp,dq)(N,e,d_p,d_q)

    On the Optimality of Lattices for the Coppersmith Technique

    Get PDF
    We investigate a method for finding small integer solutions of a univariate modular equation, that was introduced by Coppersmith and extended by May. We will refer this method as the Coppersmith technique. This paper provides a way to analyze a general limitations of the lattice construction for the Coppersmith technique. Our analysis upper bounds the possible range of UU that is asymptotically equal to the bound given by the original result of Coppersmith and May. This means that they have already given the best lattice construction. In addition, we investigate the optimality for the bivariate equation to solve the small inverse problem, which was inspired by Kunihiro\u27s argument. In particular, we show the optimality for the Boneh-Durfee\u27s equation used for RSA cryptoanalysis, To show our results, we establish framework for the technique by following the relation of Howgrave-Graham, and then concretely define the conditions in which the technique succeed and fails. We then provide a way to analyze the range of UU that satisfies these conditions. Technically, we show that the original result of Coppersmith achieves the optimal bound for UU when constructing a lattice in the standard way. We then provide evidence which indicates that constructing a non-standard lattice is generally difficult

    Finding Small Solutions of the Equation BxAy=zBx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem

    Get PDF
    In this paper, we study the condition of finding small solutions (x,y,z)=(x0,y0,z0)(x,y,z)=(x_0, y_0, z_0) of the equation BxAy=zBx-Ay=z. The framework is derived from Wiener\u27s small private exponent attack on RSA and May-Ritzenhofen\u27s investigation about the implicit factorization problem, both of which can be generalized to solve the above equation. We show that these two methods, together with Coppersmith\u27s method, are equivalent for solving BxAy=zBx-Ay=z in the general case. Then based on Coppersmith\u27s method, we present two improvements for solving BxAy=zBx-Ay=z in some special cases. The first improvement pays attention to the case where either gcd(x0,z0,A)\gcd(x_0,z_0,A) or gcd(y0,z0,B)\gcd(y_0,z_0,B) is large enough. As the applications of this improvement, we propose some new cryptanalysis of RSA, such as new results about the generalized implicit factorization problem, attacks with known bits of the prime factor, and so on. The motivation of these applications comes from oracle based complexity of factorization problems. The second improvement assumes that the value of Cz0 (mod x0)C \equiv z_0\ (\mathrm{mod}\ x_0) is known. We present two attacks on RSA as its applications. One focuses on the case with known bits of the private exponent together with the prime factor, and the other considers the case with a small difference of the two prime factors. Our new attacks on RSA improve the previous corresponding results respectively, and the correctness of the approach is verified by experiments
    corecore