Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms xe mod N and (ax + b)e mod N for known constants a, b ∈ ℤN, one can usually compute x in O(e log2 e) ℤN-operations (there are O(e2) messages for which the method fails). We show that given e cryptograms c i = (aix+bi)e mod N, i = 0, 1, ...e -1, for any known constants ai, bi ∈ ℤN, one can deterministically compute x in O(e) ℤN-operations that depend on the cryptograms, after a pre-processing that depends only on the constants. The complexity of the pre-processing is O(e log2 e) ℤN-operations, and can be amortized over many instances. We also consider a special case where the overall cost of the attack is O(e) ℤN-operations. Our tools are borrowed from numerical-analysis and adapted to handle formal polynomials over finite-rings. To the best of our knowledge their use in cryptanalysis is novl. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Yacobi, O., & Yacobi, Y. (2006). A new related message attack on RSA. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3895 LNCS, 187–195. https://doi.org/10.1007/11685654_8
Mendeley helps you to discover research relevant for your work.