Skip to main content

2015 | OriginalPaper | Buchkapitel

Implicit Factorization of RSA Moduli Revisited (Short Paper)

verfasst von : Liqiang Peng, Lei Hu, Yao Lu, Zhangjie Huang, Jun Xu

Erschienen in: Advances in Information and Computer Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we revisit the problem of factoring RSA moduli with implicit hint, where primes of two RSA moduli share some number of middle bits. Suppose that for two n-bit RSA moduli \(N_1=p_1q_1\) and \(N_2=p_2q_2\), \(q_1\) and \(q_2\) are \((\alpha n)\)-bit primes, \(p_1\) and \(p_2\) share tn bits at positions from \(t_1n\) to \(t_2n=(t_1+t)n\). Faug\(\grave{e}\)re et al. (PKC 2010) showed that when \(t\ge 4\alpha \), one can factor \(N_1\) and \(N_2\) in polynomial time. In this paper, we improve this bound to \(t>4\alpha -3\alpha ^2\) by presenting a new method of solving a homogeneous linear equation modulo unknown divisors. Our method is verified by experiments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ajtai, M.: Generating random lattices according to the invariant distribution. Draft of March (2006) Ajtai, M.: Generating random lattices according to the invariant distribution. Draft of March (2006)
2.
Zurück zum Zitat Ajtai, M.: The shortest vector problem in \(L_2\) is \(NP\)-hard for randomized reductions (extended abstract). In: Vitter, J.S. (ed.) STOC 1998. pp. 10–19. ACM (1998) Ajtai, M.: The shortest vector problem in \(L_2\) is \(NP\)-hard for randomized reductions (extended abstract). In: Vitter, J.S. (ed.) STOC 1998. pp. 10–19. ACM (1998)
3.
Zurück zum Zitat Bernstein, D.J., Chang, Y.-A., Cheng, C.-M., Chou, L.-P., Heninger, N., Lange, T., van Someren, N.: Factoring RSA keys from certified smart cards: Coppersmith in the wild. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 341–360. Springer, Heidelberg (2013) CrossRef Bernstein, D.J., Chang, Y.-A., Cheng, C.-M., Chou, L.-P., Heninger, N., Lange, T., van Someren, N.: Factoring RSA keys from certified smart cards: Coppersmith in the wild. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 341–360. Springer, Heidelberg (2013) CrossRef
4.
Zurück zum Zitat Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N\({}^{\text{0.292 }}\). IEEE Trans. Inf. Theor. 46(4), 1339–1349 (2000)MathSciNetCrossRefMATH Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N\({}^{\text{0.292 }}\). IEEE Trans. Inf. Theor. 46(4), 1339–1349 (2000)MathSciNetCrossRefMATH
5.
Zurück zum Zitat Bosma, W., Cannon, J.J., Playoust, C.: The magma algebra system I: the user language. J. Symbolic Comput. 24(3–4), 235–265 (1997)MathSciNetCrossRefMATH Bosma, W., Cannon, J.J., Playoust, C.: The magma algebra system I: the user language. J. Symbolic Comput. 24(3–4), 235–265 (1997)MathSciNetCrossRefMATH
6.
Zurück zum Zitat Coppersmith, D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Crypt. 10(4), 233–260 (1997)MathSciNetCrossRefMATH Coppersmith, D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Crypt. 10(4), 233–260 (1997)MathSciNetCrossRefMATH
7.
Zurück zum Zitat Coron, J., May, A.: Deterministic polynomial-time equivalence of computing the RSA secret key and factoring. J. Crypt. 20(1), 39–50 (2007)MathSciNetCrossRefMATH Coron, J., May, A.: Deterministic polynomial-time equivalence of computing the RSA secret key and factoring. J. Crypt. 20(1), 39–50 (2007)MathSciNetCrossRefMATH
8.
Zurück zum Zitat Faugère, J.-C., Marinier, R., Renault, G.: Implicit factoring with shared most significant and middle bits. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 70–87. Springer, Heidelberg (2010) CrossRef Faugère, J.-C., Marinier, R., Renault, G.: Implicit factoring with shared most significant and middle bits. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 70–87. Springer, Heidelberg (2010) CrossRef
9.
Zurück zum Zitat Howgrave-Graham, N.: Finding small roots of univariate modular equations revisited. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 131–142. Springer, Heidelberg (1997) Howgrave-Graham, N.: Finding small roots of univariate modular equations revisited. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 131–142. Springer, Heidelberg (1997)
10.
Zurück zum Zitat Jochemsz, E., May, A.: A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 267–282. Springer, Heidelberg (2006) CrossRef Jochemsz, E., May, A.: A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 267–282. Springer, Heidelberg (2006) CrossRef
11.
Zurück zum Zitat Jochemsz, E., May, A.: A polynomial time attack on RSA with private CRT-exponents smaller than \(N^0.073\). In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 395–411. Springer, Heidelberg (2007) CrossRef Jochemsz, E., May, A.: A polynomial time attack on RSA with private CRT-exponents smaller than \(N^0.073\). In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 395–411. Springer, Heidelberg (2007) CrossRef
12.
Zurück zum Zitat Kurosawa, K., Ueda, T.: How to factor \(N_1\) and \(N_2\) when \(p_1=p_2\;mod\;2^t\). In: Sakiyama, K., Terada, M. (eds.) IWSEC 2013. LNCS, vol. 8231, pp. 217–225. Springer, Heidelberg (2013) CrossRef Kurosawa, K., Ueda, T.: How to factor \(N_1\) and \(N_2\) when \(p_1=p_2\;mod\;2^t\). In: Sakiyama, K., Terada, M. (eds.) IWSEC 2013. LNCS, vol. 8231, pp. 217–225. Springer, Heidelberg (2013) CrossRef
13.
Zurück zum Zitat Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Public keys. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 626–642. Springer, Heidelberg (2012) CrossRef Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Public keys. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 626–642. Springer, Heidelberg (2012) CrossRef
14.
Zurück zum Zitat Lenstra, A.K., Lenstra, H.W., Lovász, L.: Factoring polynomials with rational coefficients. Math. Ann. 261(4), 515–534 (1982)MathSciNetCrossRefMATH Lenstra, A.K., Lenstra, H.W., Lovász, L.: Factoring polynomials with rational coefficients. Math. Ann. 261(4), 515–534 (1982)MathSciNetCrossRefMATH
15.
Zurück zum Zitat Lu, Y., Peng, L., Zhang, R., Lin, D.: Towards optimal bounds for implicit factorization problem. IACR Crypt. ePrint Arch. 2014, 825 (2014) Lu, Y., Peng, L., Zhang, R., Lin, D.: Towards optimal bounds for implicit factorization problem. IACR Crypt. ePrint Arch. 2014, 825 (2014)
16.
Zurück zum Zitat May, A., Ritzenhofen, M.: Implicit factoring: on polynomial time factoring given only an implicit hint. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 1–14. Springer, Heidelberg (2009) CrossRef May, A., Ritzenhofen, M.: Implicit factoring: on polynomial time factoring given only an implicit hint. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 1–14. Springer, Heidelberg (2009) CrossRef
17.
Zurück zum Zitat Peng, L., Hu, L., Xu, J., Huang, Z., Xie, Y.: Further improvement of factoring RSA moduli with implicit hint. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT. LNCS, vol. 8469, pp. 165–177. Springer, Heidelberg (2014) CrossRef Peng, L., Hu, L., Xu, J., Huang, Z., Xie, Y.: Further improvement of factoring RSA moduli with implicit hint. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT. LNCS, vol. 8469, pp. 165–177. Springer, Heidelberg (2014) CrossRef
18.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems (reprint). Commun. ACM 26(1), 96–99 (1983)CrossRef Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems (reprint). Commun. ACM 26(1), 96–99 (1983)CrossRef
19.
Zurück zum Zitat Sarkar, S., Maitra, S.: Approximate integer common divisor problem relates to implicit factorization. IEEE Trans. Inf. Theor. 57(6), 4002–4013 (2011)MathSciNetCrossRef Sarkar, S., Maitra, S.: Approximate integer common divisor problem relates to implicit factorization. IEEE Trans. Inf. Theor. 57(6), 4002–4013 (2011)MathSciNetCrossRef
Metadaten
Titel
Implicit Factorization of RSA Moduli Revisited (Short Paper)
verfasst von
Liqiang Peng
Lei Hu
Yao Lu
Zhangjie Huang
Jun Xu
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-22425-1_5

Premium Partner