International Association for Cryptologic Research (IACR)
Abstract
Since May (Crypto\u2702) revealed the vulnerability of the small CRT-exponent RSA using Coppersmith\u27s lattice-based method, several papers have studied the problem and two major improvements have been made. (1) Bleichenbacher and May (PKC\u2706) proposed an attack for small dqβ when the prime factor p is significantly smaller than the other prime factor q; the attack works for p<N0.468. (2) Jochemsz and May (Crypto\u2707) proposed an attack for small dpβ and dqβ when the prime factors p and q are balanced; the attack works for dpβ,dqβ<N0.073. Even a decade has passed since their proposals, the above two attacks are still considered as the state-of-the-art, and no improvements have been made thus far.
A novel technique seems to be required for further improvements since it seems that the attacks have been studied with all the applicable techniques for Coppersmith\u27s methods proposed by Durfee-Nguyen (Asiacrypt\u2700), Jochemsz-May (Asiacrypt\u2706), and Herrmann-May (Asiacrypt\u2709, PKC\u2710). In this paper, we propose two improved attacks on the small CRT-exponent RSA: a small dqβ attack for p<N0.5 (an improvement of Bleichenbacher-May\u27s) and a small dpβ and dqβ attack for dpβ,dqβ<N0.122 (an improvement of Jochemsz-May\u27s).
The latter result is also an improvement of our result in the proceeding version (Eurocrypt \u2717); dpβ,dqβ<N0.091. We use Coppersmith\u27s lattice-based method to solve modular equations and obtain the improvements from a novel lattice construction by exploiting useful algebraic structures of the CRT-RSA key generation equation. We explicitly show proofs of our attacks and verify the validities by computer experiments. In addition to the two main attacks, we also propose small dqβ attacks on several variants of RSA