A new partial key exposure attack on multi-power RSA

4Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

An important attack on multi-power RSA (N = prq) was introduced by Sarkar in 2014, by extending the small private exponent attack of Boneh and Durfee on classical RSA. In particular, he showed that N can be factored efficiently for r = 2 with private exponent d satisfying d < N0.395. In this paper, we generalize this work by introducing a new partial key exposure attack for finding small roots of polynomials using Coppersmith’s algorithm and Gröbner basis computation. Our attack works for all multi-power RSA exponents e (resp. d) when the exponent d (resp. e) has full size bit length. The attack requires prior knowledge of least significant bits (LSBs), and has the property that the required known part of LSB becomes smaller in the size of e. For practical validation of our attack, we demonstrate several computer algebra experiments.

Cite

CITATION STYLE

APA

Esgin, M. F., Kiraz, M. S., & Uzunkol, O. (2015). A new partial key exposure attack on multi-power RSA. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9270, pp. 103–114). Springer Verlag. https://doi.org/10.1007/978-3-319-23021-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free