Lattice Reduction on Low-Exponent RSA

نویسنده

  • Jason Dyer
چکیده

Coppersmith’s algorithm relies on a simple flaw in the RSA algorithm when messages are small compared to the public number N . Consider a message x encrypted with exponent e = 3 using modulus N for the public key where a < 3 √ N . Then the encryption z of x can be decrypted simply by taking the cube root, because the x operation never rotated x over the modulus N . This is a highly specific case, but it can be generalized to other cases, the most interesting being Coppersmith’s short pad attack. In the short pad attack the message has the same conditions as above but also a simple padding P which is known to the code-breaker. When e = 3 the encryption can be considered forming the polynomial (x+P ) = z. Then Coppersmith’s algorithm can be applied – this will solve the polynomial, reducing the case to the simple one above. (For a discussion of good padding that disallows this attack, see the section on Proper Use of Random Padding.) Also of note is the Franklin-Reiter related message attack. If the user sends related messages such that the related part can be considered equivalent to “padding”, the same problem arises. (An example of this might be starting a set of messages with “The password is”.) The sending of similar messages is a user problem, not an programmer problem, and thus cannot be controlled. While it is extremely unlikely the proper conditions will occur, any user action must be accounted for. The discussion here will be restricted to the short pad attack, but the fact the related message attack exists will become important later.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lattice based Attacks on Small Private Exponent RSA: A Survey

Lattice basis reduction algorithms have contributed a lot to cryptanalysis of RSA crypto system. With coppersmith’s theory of polynomials, these algorithms are searching for the weak instances of Number-theoretic cryptography, mainly RSA. In this paper we present several lattice based attacks on low private exponent of RSA.

متن کامل

The Effectiveness of Lattice Attacks Against Low-Exponent RSA

At Eurocrypt ’96, Coppersmith presented a novel application of lattice reduction to find small roots of a univariate modular polynomial equation. This led to rigorous polynomial attacks against RSA with low public exponent, in some particular settings such as encryption of stereotyped messages, random padding, or broadcast applications à la Hast̊ad. Theoretically, these are the most powerful kno...

متن کامل

The E ectiveness of Lattice Attacks AgainstLow - Exponent

At Eurocrypt '96, Coppersmith presented a novel application of lattice reduction to nd small roots of a univariate modular polynomial equation. This led to rigorous polynomial attacks against RSA with low public exponent, in some particular settings such as encryption of stereotyped messages, random padding, or broadcast applications a la Hast ad. Theoretically, these are the most powerful know...

متن کامل

On the Design of Rebalanced RSA-CRT

In 1982, Quisquater & Couvreur proposed a variant of RSA based on the Chinese Remainder Theorem, called RSA-CRT, to speed up RSA decryption. In 1990, Wiener suggested another variant, called Rebalanced RSA-CRT, which further speeds up RSA decryption by shifting decryption costs to encryption costs. However, this approach essentially maximizes the encryption time since the public exponent e in R...

متن کامل

Low Secret Exponent RSA Revisited

We present a lattice attack on low exponent RSA with short secret exponent d = N for every δ < 0.29. The attack is a variation of an approach by Boneh and Durfee [4] based on lattice reduction techniques and Coppersmith’s method for finding small roots of modular polynomial equations. Although our results are slightly worse than the results of Boneh and Durfee they have several interesting feat...

متن کامل

Simple Backdoors on RSA Modulus by Using RSA Vulnerability

This investigation proposes two methods for embedding backdoors in the RSA modulus N = pq rather than in the public exponent e. This strategy not only permits manufacturers to embed backdoors in an RSA system, but also allows users to choose any desired public exponent, such as e = 216 +1, to ensure efficient encryption. This work utilizes lattice attack and exhaustive attack to embed backdoors...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003