A new related message attack on RSA

被引:0
|
作者
Yacobi, O
Yacobi, Y
机构
[1] Univ Calif San Diego, Dept Math, La Jolla, CA 92093 USA
[2] Microsoft Res, Redmond, WA 98052 USA
来源
THEORETICAL COMPUTER SCIENCE | 2006年 / 3895卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms x(e) mod N and (ax+b)(e) mod N for known constants a, b is an element of Z(N), one can usually compute x in O(e log(2) e) Z(N)-operations (there axe O(e(2)) messages for which the method fails). We show that given e cryptograms c(i)equivalent to(a(i)x+b(i))(e) mod N, i=0, 1,...e-1, for any known constants a(i), b(i) is an element of Z(N), one can deterministically compute x in O(e) Z(N)-operations that depend on the cryptograms, after a pre-processing that depends only on the constants. The complexity of the pre-processing is O(e log(2) e) Z(N)-operations, and can be amortized over many instances. We also consider a special case where the overall cost of the attack is O(e) Z(N)-operations. Our tools are borrowed from numerical-analysis and adapted to handle formal polynomials over finite-rings. To the best of our knowledge their use in cryptanalysis is novel.
引用
收藏
页码:187 / 195
页数:9
相关论文
共 50 条
  • [1] A new related message attack on RSA
    Yacobi, Oded
    Yacobi, Yacov
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, 3895 LNCS : 187 - 195
  • [2] A new related message attack on RSA
    Yacobi, O
    Yacobi, Y
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 1 - 8
  • [3] A new attack on some RSA variants
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    [J]. THEORETICAL COMPUTER SCIENCE, 2023, 960
  • [4] Ghost Key patterns With Equidistant Chosen message Attack on RSA-CRT
    Park, Jong Yeon
    Han, Dong-Guk
    Yi, Okyeon
    Choi, Dooho
    [J]. 2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
  • [5] Enhanced power analysis attack using chosen message against RSA hardware implementations
    Miyamoto, Atsushi
    Homma, Naofumi
    Aoki, Takafumi
    Satoh, Akashi
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 3282 - +
  • [6] A new attack on RSA with two or three decryption exponents
    Nitaj, Abderrahmane
    [J]. JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2013, 42 (1-2) : 309 - 319
  • [7] A New Attack on Special-Structured RSA Primes
    Ghafar, A. H. A.
    Arin, M. R. K.
    Asbullah, M. A.
    [J]. MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2019, 13 : 111 - 125
  • [8] A New Side-Channel Attack on RSA Prime Generation
    Finke, Thomas
    Gebhardt, Max
    Schindler, Werner
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 141 - 155
  • [9] Revisiting Wiener's attack - New weak keys in RSA
    Maitra, Subhamoy
    Sarkar, Santanu
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 228 - 243
  • [10] A New LSB Attack on Special-Structured RSA Primes
    Abd Ghafar, Amir Hamzah
    Ariffin, Muhammad Rezal Kamel
    Asbullah, Muhammad Asyraf
    [J]. SYMMETRY-BASEL, 2020, 12 (05):