New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method

This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = p q in polynomial time. The paper has two parts. In the first part, we report the usage of the small prime difference method of the form | b 2 p − a 2 q | < N γ where...

Full description

Saved in:
Bibliographic Details
Published inCryptography Vol. 3; no. 1; p. 2
Main Authors Kamel Ariffin, Muhammad Rezal, Abubakar, Saidu Isah, Yunos, Faridah, Asbullah, Muhammad Asyraf
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.03.2019
Subjects
Online AccessGet full text
ISSN2410-387X
2410-387X
DOI10.3390/cryptography3010002

Cover

More Information
Summary:This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = p q in polynomial time. The paper has two parts. In the first part, we report the usage of the small prime difference method of the form | b 2 p − a 2 q | < N γ where the ratio of q p is close to b 2 a 2 , which yields a bound d < 3 2 N 3 4 − γ from the convergents of the continued fraction expansion of e N − ⌈ a 2 + b 2 a b N ⌉ + 1 . The second part of the paper reports four cryptanalytic attacks on t instances of RSA moduli N s = p s q s for s = 1 , 2 , … , t where we use N − ⌈ a 2 + b 2 a b N ⌉ + 1 as an approximation of ϕ ( N ) satisfying generalized key equations of the shape e s d − k s ϕ ( N s ) = 1 , e s d s − k ϕ ( N s ) = 1 , e s d − k s ϕ ( N s ) = z s , and e s d s − k ϕ ( N s ) = z s for unknown positive integers d , k s , d s , k s , and z s , where we establish that t RSA moduli can be simultaneously factored in polynomial time using combinations of simultaneous Diophantine approximations and lattice basis reduction methods. In all the reported attacks, we have found an improved short secret exponent bound, which is considered to be better than some bounds as reported in the literature.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2410-387X
2410-387X
DOI:10.3390/cryptography3010002