4.5 Article

Small Private Exponent Attacks on RSA Using Continued Fractions and Multicore Systems

期刊

SYMMETRY-BASEL
卷 14, 期 9, 页码 -

出版社

MDPI
DOI: 10.3390/sym14091897

关键词

continued fractions; private exponent attack; RSA; Wiener's attack; integer factorization; multicore systems

资金

  1. Scientific Research Deanship at University of Ha'il-Saudi Arabia [RG-21 124]

向作者/读者索取更多资源

This paper presents a new technique that improves the attack on RSA with small private exponent using continued fractions and multicore systems. By finding an interval containing phi(n) and generating different points within the interval, the proposed technique enables the recovery of the private key. Experimental results show that the previous bound of the private key has been extended after three attacks on RSA with small private exponents.
The RSA (Rivest-Shamir-Adleman) asymmetric-key cryptosystem is widely used for encryptions and digital signatures. Let (n, e) be the RSA public key and d be the corresponding private key (or private exponent). One of the attacks on RSA is to find the private key d using continued fractions when d is small. In this paper, we present a new technique to improve a small private exponent attack on RSA using continued fractions and multicore systems. The idea of the proposed technique is to find an interval that contains phi(n), and then propose a method to generate different points in the interval that can be used by continued fraction and multicore systems to recover the private key, where phi is Euler's totient function. The practical results of three small private exponent attacks on RSA show that we extended the previous bound of the private key that is discovered by continued fractions. When n is 1024 bits, we used 20 cores to extend the bound of d by 0.016 for de Weger, Maitra-Sarkar, and Nassr et al. attacks in average times 7.67 h, 2.7 h, and 44 min, respectively.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据