The Attack of the RSA Subgroup Assumption

被引:0
|
作者
Weng, Jiang [1 ,2 ]
Dou, Yun-Qi [1 ,2 ]
Ma, Chuan-Gui [1 ,2 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
RSA moduli; hidden order; subgroup; cryptanalysis; semi-smooth RSA; INTERPOLATION; COMPUTATION; EFFICIENT; TRANSFORM; POINTS; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In TCC 2005, Groth proposed the cryptographic usefulness of a small subgroup G of Z(N)*. of hidden order. So far, the best attack of previous method for a subgroup of Z(N)* had a complexity about O(root p'). In this paper, we propose the interval and the double walks method to speed up the computation of the semi-smooth RSA subgroup problem. Our new algorithm reduces the complexity to O(root p'/2) rather than O(root p'). Besides the theoretical analysis, we also compare the performances of our new algorithm with the previous algorithm in experiments, and the efficiency of our new algorithm is approach to 50% faster than the previous.
引用
下载
收藏
页码:597 / 610
页数:14
相关论文
共 50 条
  • [41] Fault-Based Attack of RSA Authentication
    Pellegrini, Andrea
    Bertacco, Valeria
    Austin, Todd
    2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 2010, : 855 - 860
  • [42] On an attack on RSA with small CRT-exponents
    LiDong Han
    XiaoYun Wang
    GuangWu Xu
    Science China Information Sciences, 2010, 53 : 1511 - 1518
  • [43] Hardware fault attack on RSA with CRT revisited
    Yen, SM
    Moon, S
    Ha, JC
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 374 - 388
  • [44] Perturbating RSA public keys: An improved attack
    Berzati, Alexandre
    Canovas, Cecile
    Goubin, Louis
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 380 - +
  • [45] On an attack on RSA with small CRT-exponents
    Han LiDong
    Wang XiaoYun
    Xu GuangWu
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (08) : 1511 - 1518
  • [46] RSA-padding signatures with attack studies
    Stephanides, George
    Constantinescu, Nicolae
    Cosulschi, Mirel
    Gabroveanu, Mihai
    WEBIST 2006: Proceedings of the Second International Conference on Web Information Systems and Technologies: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 97 - 100
  • [47] Permanent fault attack on the parameters of RSA with CRT
    Yen, SM
    Moon, S
    Ha, J
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 285 - 296
  • [48] Implicit-Key Attack on the RSA Cryptosystem
    Zheng, Mengce
    Hu, Honggang
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 354 - 362
  • [49] An Efficient Synchronized Aggregate Signature Scheme From Standard RSA Assumption
    Quo, Xinshun
    Wang, Zhiwei
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (03): : 229 - 240
  • [50] The Wiener Attack on RSA Revisited: A Quest for the Exact Bound
    Susilo, Willy
    Tonien, Joseph
    Yang, Guomin
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 381 - 398