On (Unknowingly) Using Near-Square RSA Primes

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

Abstract

The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough within the long history of secret communications. Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. However, the generation of the RSA modulus, (Formula presented.) which requires p and q to be random primes, may accidentally entail the choice of a special type of prime called a near-square prime. This structure of N may be used unknowingly en masse in real-world applications since no current cryptographic implementation prevents its generation. In this study, we show that use of this type of prime will potentially lead to total destruction of RSA. We present three cases of near-square primes used as RSA primes, set in the form of (i) (Formula presented.) ; (ii) (Formula presented.) ; and (iii) (Formula presented.). Although (ii) and (iii) are quite similar, p and q must be within the same size range of n-bits, which results in different conditions for both cases. We formulate attacks using three different algorithms to better understand their feasibility. We also provide an efficient countermeasure that it is recommended is adopted by current cryptographic libraries with RSA implementation.

Cite

CITATION STYLE

APA

Ruzai, W. N. A., Abd Ghafar, A. H., Salim, N. R., & Ariffin, M. R. K. (2022). On (Unknowingly) Using Near-Square RSA Primes. Symmetry, 14(9). https://doi.org/10.3390/sym14091898

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free