A new related message attack on RSA

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms xe mod N and (ax + b)e mod N for known constants a, b ∈ ℤN, one can usually compute x in O(e log2 e) ℤN-operations (there are O(e2) messages for which the method fails). We show that given e cryptograms c i = (aix+bi)e mod N, i = 0, 1, ...e -1, for any known constants ai, bi ∈ ℤN, one can deterministically compute x in O(e) ℤN-operations that depend on the cryptograms, after a pre-processing that depends only on the constants. The complexity of the pre-processing is O(e log2 e) ℤN-operations, and can be amortized over many instances. We also consider a special case where the overall cost of the attack is O(e) ℤN-operations. Our tools are borrowed from numerical-analysis and adapted to handle formal polynomials over finite-rings. To the best of our knowledge their use in cryptanalysis is novl. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Yacobi, O., & Yacobi, Y. (2006). A new related message attack on RSA. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3895 LNCS, 187–195. https://doi.org/10.1007/11685654_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free