Cryptanalysis of RSA variants with primes sharing most significant bits (Q2154038)

From MaRDI portal
Revision as of 01:19, 1 August 2023 by Importer (talk | contribs) (‎Created a new Item)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
scientific article
Language Label Description Also known as
English
Cryptanalysis of RSA variants with primes sharing most significant bits
scientific article

    Statements

    Cryptanalysis of RSA variants with primes sharing most significant bits (English)
    0 references
    0 references
    0 references
    0 references
    13 July 2022
    0 references
    Here, four variants of the RSA encryption based on factoring \(N = pq\) are considered, where the public exponent \(e\) and the private exponent \(d\) satisfy the equation \(ed \equiv 1\pmod{({p^2} - 1)({q^2} - 1)}\). The authors consider attacks using the continued fraction algorithm and by applying \textit{D. Coppersmith}'s method (see [J. Cryptology 10, No. 4, 233--260 (1997; Zbl 0912.11056)]) together with lattice reduction techniques and show for both attacks that the variants are insecure if the difference \(p - q\) and the private exponent \(d\) are small. For the entire collection see [Zbl 1490.68022].
    0 references
    0 references
    RSA variants
    0 references
    cyber attacks
    0 references
    continued fractions
    0 references
    Coppersmith's method
    0 references
    lattice reduction
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references