CRYPTANALYSIS OF SHORT RSA SECRET EXPONENTS

被引:337
|
作者
WIENER, MJ
机构
[1] Bell-Northern Research. Ltd., K1Y 4H7. Ontario
关键词
D O I
10.1109/18.54902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
exponents is described. The attack makes use of an algorithm based on continued fractions that finds the numerator and denominator of a fraction in polynomial time when a close enough estimate of the fraction is known. The public exponent e and the modulus pq can be used to create an estimate of a fraction that involves the secret exponent d. The algorithm based on continued fractions uses this estimate to discover sufficiently short secret exponents. For a typical case where e < pq, GCD(p - 1, q- 1) is small, and p and q have approximately the same number of bits, this attack will discover secret exponents with up to approximately one-quarter as many bits as the modulus. Ways to combat this attack, ways to improve it, and two open problems are described. This attack poses no threat to the normal case of RSA where the secret exponent is approximately the same size as the modulus. This is because this attack uses information provided by the public exponent and, in the normal case, the public exponent can be chosen almost independently of the modulus. A cryptanalvtic attack on the use of short RSA secret. © 1990 IEEE
引用
收藏
页码:553 / 558
页数:6
相关论文
共 50 条
  • [1] CRYPTANALYSIS OF SHORT RSA SECRET EXPONENTS
    WIENER, MJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 372 - 372
  • [2] Cryptanalysis of 'less short' RSA secret exponents
    Verheul, ER
    vanTilborg, HCA
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 1997, 8 (05) : 425 - 435
  • [3] Cryptanalysis of ‘Less Short’ RSA Secret Exponents
    Eric R. Verheul
    Henk C. A. van Tilborg
    [J]. Applicable Algebra in Engineering, Communication and Computing, 1997, 8 : 425 - 435
  • [4] Cryptanalysis of short secret exponents modulo RSA primes
    Chen, CY
    Ku, CY
    Yen, DC
    [J]. INFORMATION SCIENCES, 2004, 160 (1-4) : 225 - 233
  • [5] Cryptanalysis of RSA with Multiple Small Secret Exponents
    Takayasu, Atsushi
    Kunihiro, Noboru
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 176 - 191
  • [6] Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents
    Peng, Liqiang
    Hu, Lei
    Lu, Yao
    Sarkar, Santanu
    Xu, Jun
    Huang, Zhangjie
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 : 105 - 123
  • [7] Cryptanalysis of RSA with two decryption exponents
    Sarkar, Santanu
    Maitra, Subhamoy
    [J]. INFORMATION PROCESSING LETTERS, 2010, 110 (05) : 178 - 181
  • [8] Cryptanalysis of the RSA schemes with short secret exponent from Asiacrypt '99
    Durfee, G
    Nguyen, PQ
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 14 - 29
  • [9] Cryptanalysis of Prime Power RSA with two private exponents
    ZHENG MengCe
    HU HongGang
    [J]. Science China(Information Sciences), 2015, 58 (11) : 59 - 66
  • [10] Cryptanalysis of Prime Power RSA with two private exponents
    Zheng MengCe
    Hu HongGang
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 8