New attacks on RSA with Moduli N = prq

8Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present three attacks on the Prime Power RSA with modulus N = prq. In the first attack, we consider a public exponent e satisfying an equation ex − φ(N)y = z where φ(N) = pr−1(p − 1)(q − 1). We show that one can factor N if the parameters |x| and |z| satisfy (equation found) thereby extending the recent results of Sakar [16]. In the second attack, we consider two public exponents e1 and e2 and their corresponding private exponents d1 and d2. We show that one can factor N when d1 and d2 share a suitable amount of their most significant bits, that is (equation found). The third attack enables us to factor two Prime Power RSA moduli N1 = pr1q1 and N2 = pr2q2 when p1 and p2 share a suitable amount of their most significant bits, namely, (equation found).

Cite

CITATION STYLE

APA

Nitaj, A., & Rachidi, T. (2015). New attacks on RSA with Moduli N = prq. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9084, pp. 352–360). Springer Verlag. https://doi.org/10.1007/978-3-319-18681-8_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free