Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
7 1.5 Organization <strong>of</strong> the Thesis<br />
1.5 Organization <strong>of</strong> the Thesis<br />
The thesis presents several cryptanalytic results against the <strong>RSA</strong> cryptosystem<br />
when parts <strong>of</strong> the secret key are known or known in disguise. Most <strong>of</strong> our results<br />
use the LLL algorithm to obtain the secret key, and the main idea for each application<br />
is how to phrase the problem as a lattice problem and how to compute<br />
the dimension and determinant <strong>of</strong> the lattice. Lattice based root-finding ideas for<br />
polynomials is the theme for most <strong>of</strong> the results presented here. Moreover, all<br />
the results and discussions are targeted towards finding weaknesses in the <strong>RSA</strong><br />
cryptosystem and its implementation. There are several attempts at <strong>RSA</strong> cryptanalysis<br />
in the same vein, and this thesis also illustrates how these results improve<br />
on the previous state <strong>of</strong> the art.<br />
It is recommended that one reads the chapters in the order they are presented.<br />
However, the reader may choose to browse quickly to a chapter <strong>of</strong> his/her choice<br />
and refer back to Chapter 2 for the mathematical background. A short summary<br />
for each chapter is presented as follows.<br />
Chapter 1: In the current chapter, we have discussed some introductory materials<br />
regarding cryptography, and its major classifications. We also present the goal<br />
and structure <strong>of</strong> this thesis.<br />
Chapter 2: In the next chapter, we start with some basic mathematical definitions<br />
and an overview <strong>of</strong> the <strong>RSA</strong> cryptosystem. In section 2.5, we introduce lattice<br />
based root finding techniques for modular polynomials. In section 2.6, we discuss<br />
the approach to find roots <strong>of</strong> a polynomial over integers. We will use these root<br />
finding techniques frequently in the thesis.<br />
Chapter 3: In this chapter, we discuss our work to identify encryption exponents<br />
for which <strong>RSA</strong> becomes weak. The materials <strong>of</strong> this chapter are based on our<br />
publication [81].<br />
Chapter 4: Here we study the vulnerabilities <strong>of</strong> <strong>RSA</strong> in terms <strong>of</strong> its decryption<br />
exponent. We go through the model <strong>of</strong> <strong>RSA</strong> in the presence <strong>of</strong> many decryption<br />
exponents, anddiscussourworkregardingcryptanalysis<strong>of</strong><strong>RSA</strong>withinthismodel.<br />
The materials <strong>of</strong> this chapter are based on our publications [114,115].