Skip to main content
Top

2019 | OriginalPaper | Chapter

The Wiener Attack on RSA Revisited: A Quest for the Exact Bound

Authors : Willy Susilo, Joseph Tonien, Guomin Yang

Published in: Information Security and Privacy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Since Wiener pointed out that the RSA can be broken if the private exponent d is relatively small compared to the modulus N (using the continued fraction technique), it has been a general belief that the Wiener attack works for \(d < N^{\frac{1}{4}}\). On the contrary, in this work, we give an example where the Wiener attack fails with \(d = \left\lfloor \frac{1}{2} N^{\frac{1}{4}} \right\rfloor + 1\), thus, showing that the bound \(d < N^{\frac{1}{4}}\) is not accurate as it has been thought of. By using the classical Legendre Theorem on continued fractions, in 1999 Boneh provided the first rigorous proof which showed that the Wiener attack works for \(d < \frac{1}{3} N^{\frac{1}{4}}\). However, the question remains whether \(\frac{1}{3} N^{\frac{1}{4}}\) is the best bound for the Wiener attack. Additionally, the question whether another rigorous proof for a better bound exists remains an elusive research problem. In this paper, we attempt to answer the aforementioned problems by improving Boneh’s bound after the two decades of research. By a new proof, we show that the Wiener continued fraction technique works for a wider range, namely, for \(d \le \frac{1}{\root 4 \of {18}} N^{\frac{1}{4}} = \frac{1}{2.06...} N^{\frac{1}{4}}\). Our new analysis is supported by an experimental result where it is shown that the Wiener attack can successfully perform the factorization on the RSA modulus N and determine a private key d where \(d = \left\lfloor \frac{1}{\root 4 \of {18}} N^{\frac{1}{4}} \right\rfloor \).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Not. Am. Math. Soc. 46, 203–213 (1999)MathSciNetMATH Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Not. Am. Math. Soc. 46, 203–213 (1999)MathSciNetMATH
4.
go back to reference Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key \(d\) less than \(N^{0.292}\). IEEE Trans. Inf. Theor. 46, 1339–1349 (2000)MathSciNetCrossRef Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key \(d\) less than \(N^{0.292}\). IEEE Trans. Inf. Theor. 46, 1339–1349 (2000)MathSciNetCrossRef
6.
go back to reference Bunder, M., Nitaj, A., Susilo, W., Tonien, J.: A generalized attack on RSA type cryptosystems. Theor. Comput. Sci. 704, 74–81 (2017)MathSciNetCrossRef Bunder, M., Nitaj, A., Susilo, W., Tonien, J.: A generalized attack on RSA type cryptosystems. Theor. Comput. Sci. 704, 74–81 (2017)MathSciNetCrossRef
7.
go back to reference Bunder, M., Nitaj, A., Susilo, W., Tonien, J.: Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves. J. Inf. Secur. Appl. 40, 193–198 (2018) Bunder, M., Nitaj, A., Susilo, W., Tonien, J.: Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves. J. Inf. Secur. Appl. 40, 193–198 (2018)
8.
go back to reference Bunder, M., Tonien, J.: A new attack on the RSA cryptosystem based on continued fractions. Malays. J. Math. Sci. 11, 45–57 (2017)MathSciNet Bunder, M., Tonien, J.: A new attack on the RSA cryptosystem based on continued fractions. Malays. J. Math. Sci. 11, 45–57 (2017)MathSciNet
9.
go back to reference Coppersmith, D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptology 10, 233–260 (1997)MathSciNetCrossRef Coppersmith, D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptology 10, 233–260 (1997)MathSciNetCrossRef
10.
go back to reference Dujella, A.: Continued fractions and RSA with small secret exponent. Tatra Mt. Math. Publ. 29, 101–112 (2004)MathSciNetMATH Dujella, A.: Continued fractions and RSA with small secret exponent. Tatra Mt. Math. Publ. 29, 101–112 (2004)MathSciNetMATH
12.
go back to reference Hardy, G., Wright, E.: An Introduction to the Theory of Numbers, 6th edn. Oxford University Press, Oxford (2008)MATH Hardy, G., Wright, E.: An Introduction to the Theory of Numbers, 6th edn. Oxford University Press, Oxford (2008)MATH
14.
go back to reference Legendre, A.M.: Essai sur la théorie des nombres. Duprat, An VI, Paris (1798) Legendre, A.M.: Essai sur la théorie des nombres. Duprat, An VI, Paris (1798)
15.
go back to reference Nassr, D.I., Bahig, H.M., Bhery, A., Daoud, S.S.: A new RSA vulnerability using continued fractions. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications AICCSA, 2008, pp. 694–701 (2008) Nassr, D.I., Bahig, H.M., Bhery, A., Daoud, S.S.: A new RSA vulnerability using continued fractions. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications AICCSA, 2008, pp. 694–701 (2008)
16.
go back to reference Olds, C.D.: Continued fractions. New Mathematical Library, vol. 9. Mathematical Association of America, Washington (1963)MATH Olds, C.D.: Continued fractions. New Mathematical Library, vol. 9. Mathematical Association of America, Washington (1963)MATH
18.
go back to reference Verheul, E., van Tilborg, H.: Cryptanalysis of ‘less short’ RSA secret exponents. Appl. Algebra Eng. Commun. Comput. 8, 425–435 (1997)MathSciNetCrossRef Verheul, E., van Tilborg, H.: Cryptanalysis of ‘less short’ RSA secret exponents. Appl. Algebra Eng. Commun. Comput. 8, 425–435 (1997)MathSciNetCrossRef
19.
go back to reference de Weger, B.: Cryptanalysis of RSA with small prime difference. Appl. Algebra Eng. Commun. Comput. 13, 17–28 (2002)MathSciNetCrossRef de Weger, B.: Cryptanalysis of RSA with small prime difference. Appl. Algebra Eng. Commun. Comput. 13, 17–28 (2002)MathSciNetCrossRef
Metadata
Title
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound
Authors
Willy Susilo
Joseph Tonien
Guomin Yang
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-21548-4_21

Premium Partner