11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7 1.5 Organization <strong>of</strong> the Thesis<br />

1.5 Organization <strong>of</strong> the Thesis<br />

The thesis presents several cryptanalytic results against the <strong>RSA</strong> cryptosystem<br />

when parts <strong>of</strong> the secret key are known or known in disguise. Most <strong>of</strong> our results<br />

use the LLL algorithm to obtain the secret key, and the main idea for each application<br />

is how to phrase the problem as a lattice problem and how to compute<br />

the dimension and determinant <strong>of</strong> the lattice. Lattice based root-finding ideas for<br />

polynomials is the theme for most <strong>of</strong> the results presented here. Moreover, all<br />

the results and discussions are targeted towards finding weaknesses in the <strong>RSA</strong><br />

cryptosystem and its implementation. There are several attempts at <strong>RSA</strong> cryptanalysis<br />

in the same vein, and this thesis also illustrates how these results improve<br />

on the previous state <strong>of</strong> the art.<br />

It is recommended that one reads the chapters in the order they are presented.<br />

However, the reader may choose to browse quickly to a chapter <strong>of</strong> his/her choice<br />

and refer back to Chapter 2 for the mathematical background. A short summary<br />

for each chapter is presented as follows.<br />

Chapter 1: In the current chapter, we have discussed some introductory materials<br />

regarding cryptography, and its major classifications. We also present the goal<br />

and structure <strong>of</strong> this thesis.<br />

Chapter 2: In the next chapter, we start with some basic mathematical definitions<br />

and an overview <strong>of</strong> the <strong>RSA</strong> cryptosystem. In section 2.5, we introduce lattice<br />

based root finding techniques for modular polynomials. In section 2.6, we discuss<br />

the approach to find roots <strong>of</strong> a polynomial over integers. We will use these root<br />

finding techniques frequently in the thesis.<br />

Chapter 3: In this chapter, we discuss our work to identify encryption exponents<br />

for which <strong>RSA</strong> becomes weak. The materials <strong>of</strong> this chapter are based on our<br />

publication [81].<br />

Chapter 4: Here we study the vulnerabilities <strong>of</strong> <strong>RSA</strong> in terms <strong>of</strong> its decryption<br />

exponent. We go through the model <strong>of</strong> <strong>RSA</strong> in the presence <strong>of</strong> many decryption<br />

exponents, anddiscussourworkregardingcryptanalysis<strong>of</strong><strong>RSA</strong>withinthismodel.<br />

The materials <strong>of</strong> this chapter are based on our publications [114,115].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!