4.5 Article

A New LSB Attack on Special-Structured RSA Primes

期刊

SYMMETRY-BASEL
卷 12, 期 5, 页码 -

出版社

MDPI
DOI: 10.3390/sym12050838

关键词

cryptography; RSA cryptosystem; RSA cryptanalysis; partial key exposure attack

资金

  1. Ministry of Education of Malaysia [FRGS/1/2019/STG06/UPM/02/08]

向作者/读者索取更多资源

Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest-Shamir-Adleman (RSA) cryptosystem is highly regarded as one of the most deployed public-key cryptosystem today. Previous attacks on the cryptosystem focus on the effort to weaken the hardness of integer factorization problem, embedded in the RSA modulus, N=pq. The adversary used several assumptions to enable the attacks. For examples, p and q which satisfy Pollard's weak primes structures and partial knowledge of least significant bits (LSBs) of p and q can cause N to be factored in polynomial time, thus breaking the security of RSA. In this paper, we heavily utilized both assumptions. First, we assume that p and q satisfy specific structures where p=am+rp and q=bm+rq for a,b are positive integers and m is a positive even number. Second, we assume that the bits of rp and rq are the known LSBs of p and q respectively. In our analysis, we have successfully factored N in polynomial time using both assumptions. We also counted the number of primes that are affected by our attack. Based on the result, it may poses a great danger to the users of RSA if no countermeasure being developed to resist our attack.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据