Computing Reviews

Index calculation attacks on RSA signature and encryption
Coron J., Naccache D., Desmedt Y., Odlyzko A., Stern J. Designs, Codes and Cryptography38(1):41-53,2006.Type:Article
Date Reviewed: 07/03/06

This paper reports on a chosen ciphertext attack on the use of the RSA algorithm for digital signatures. It also describes a related attack on RSA-based privacy, but the main interest is in signatures. This attack is applied to a working encryption standard, ISO/IEC 9796-2, which has been revised in light of this attack.

The main idea is to choose integers (the messages to be encrypted) with suitable smoothness (small prime divisors) and likelihood. The chosen ciphertexts provide a system of linear equations in exponents tied to the RSA scheme, which can reveal the message. The obstacle to this method is that subexponential running time (in the RSA modulus N) for privacy depends on the nonce &mgr; (m) for the message m being small, which is generally not the case. For signatures, the authors explain how to reduce the nonce size to hash sizes (at most a few hundred bits) by working with !28&mgr;(m) - i ... N, rather than &mgr;(m). All running times are based on the subexponential function Lx(&bgr;) = exp(&bgr;√log(x) ... loglog(x)).

The chief contribution of the paper lies not so much in the analysis of the method discussed, but in the demonstration of its practical limitations.

Reviewer:  Bruce Litow Review #: CR133016 (0705-0487)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy