The Attack of the RSA Subgroup Assumption

被引:0
|
作者
Weng, Jiang [1 ,2 ]
Dou, Yun-Qi [1 ,2 ]
Ma, Chuan-Gui [1 ,2 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
RSA moduli; hidden order; subgroup; cryptanalysis; semi-smooth RSA; INTERPOLATION; COMPUTATION; EFFICIENT; TRANSFORM; POINTS; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In TCC 2005, Groth proposed the cryptographic usefulness of a small subgroup G of Z(N)*. of hidden order. So far, the best attack of previous method for a subgroup of Z(N)* had a complexity about O(root p'). In this paper, we propose the interval and the double walks method to speed up the computation of the semi-smooth RSA subgroup problem. Our new algorithm reduces the complexity to O(root p'/2) rather than O(root p'). Besides the theoretical analysis, we also compare the performances of our new algorithm with the previous algorithm in experiments, and the efficiency of our new algorithm is approach to 50% faster than the previous.
引用
下载
收藏
页码:597 / 610
页数:14
相关论文
共 50 条
  • [31] Securing RSA Algorithm against Timing Attack
    Arjunan, Amuthan
    Narayanan, Praveena
    Ramu, Kaviarasan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 471 - 476
  • [32] Power attack on small RSA public exponent
    Fouque, Pierre-Alain
    Kunz-Jacques, Sebastien
    Martinet, Gwenaelle
    Muller, Frederic
    Valette, Frederic
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 339 - 353
  • [33] On the improvement of the BDF attack on LSBS-RSA
    Sun, Hung-Min
    Wu, Mu-En
    Wang, Huaxiong
    Guo, Jian
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 84 - +
  • [34] A shrinkage estimator for subgroup analysis without the exchangeability assumption
    Snapinn, Steven
    JOURNAL OF BIOPHARMACEUTICAL STATISTICS, 2021, 31 (06) : 723 - 735
  • [35] Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
    Gentry, Craig
    Lewko, Allison Bishop
    Sahai, Amit
    Waters, Brent
    2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2015, : 151 - 170
  • [36] A Lossy Identification Scheme Using the Subgroup Decision Assumption
    Hasegawa, Shingo
    Isobe, Shuji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (06) : 1296 - 1306
  • [37] On an attack on RSA with small CRT-exponents
    HAN LiDong 1
    2 School of Mathematics
    3 Institute for Advanced Study
    4 Department of Electrical Engineering and Computer Science
    Science China(Information Sciences), 2010, 53 (08) : 1511 - 1518
  • [38] A practical timing attack on RSA over a LAN
    Lodato, Mark J.
    Jouny, Ismail
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [39] An Application of Low Private Exponent Attack on RSA
    Zheng, Yong-Hui
    Zhu, Yue-Fei
    Xu, Hong
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1864 - 1866
  • [40] Another generalization of Wiener's attack on RSA
    Nitaj, Abderrahmane
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 174 - 190