Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A generalized attack on RSA type cryptosystems
Bunder M., Nitaj A., Susilo W., Tonien J. Theoretical Computer Science704  74-81,2017.Type:Article
Date Reviewed: Mar 23 2018

The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large prime numbers p and q, the public key is the pair (N,e), where N=pq and e is called the exponent and satisfies gcd (e,(p-1)(q-1)) = 1. The private key is the pair (N,d) where d is the inverse of e modulo (p-1)(q-1). In general, to compute d from e, knowledge of both p and q is required, and so it is in general very hard to compute the private key from the public key, if p and q are large enough.

Quite a number of theoretical results are known on the factorization of large integers. In some cases--when p and q satisfy particular number-theoretic conditions--it might be feasible to compute p and q from a given N. So far, these results do not affect the general safety of the RSA cryptosystem, as it remains sufficient to choose the prime numbers p and q in such a way that particular attacks are not possible.

This paper describes such a particular attack in the case that gcd (e,(p2-1)(q2-1))=1. This attack is based on the following theorem, which is proved in the paper:

Let p,q be primes and q < p < 2q, and e be an exponent satisfying an equation

ex - (p2-1)(q2-1) y = z

with coprime positive integers x and y. If

xy < 2N - 42N3⁄4

and

|z| < (p - q)N1⁄4y,

then p and q can be computed in polynomial time in log(N).

Reviewer:  Jan De Beule Review #: CR145929 (1806-0322)
Bookmark and Share
  Featured Reviewer  
 
Public Key Cryptosystems (E.3 ... )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy