11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2: Mathematical Preliminaries 24<br />

and Stănică [80], and Chen and Zhu [20] for results related to the prime power<br />

factorization <strong>of</strong> n! for any positive integer n. There have been many attempts to<br />

factor integers <strong>of</strong> other special forms as well; namely the factorization <strong>of</strong> Fermat<br />

numbers [78], the factorization <strong>of</strong> Mersenne numbers [132] etc.<br />

2.3.2 Partial Exposure <strong>of</strong> Primes<br />

Coppersmith[22,24]provedthatfactorization<strong>of</strong>the<strong>RSA</strong>moduluscanbeachieved<br />

in polynomial time given half <strong>of</strong> the Most Significant Bits (MSBs), that is the<br />

contiguous top half, <strong>of</strong> one <strong>of</strong> the factors. Later Boneh et al [16] proved a similar<br />

result when half <strong>of</strong> the Least Significant Bits (LSBs), that is the contiguous lower<br />

half, <strong>of</strong> one <strong>of</strong> the factors is known.<br />

2.3.3 Small Public Exponent Attack<br />

Bob may choose the public exponent e very small (3, say) to allow Alice the<br />

privilege <strong>of</strong> faster encryption. Suppose an attacker knows a contiguous chunk <strong>of</strong><br />

Most Significant Bits (MSBs) <strong>of</strong> m, and constructs an approximation m 1 , such<br />

that m 1 and m share the known chunk <strong>of</strong> bits at the top. If |m−m 1 | < N 1 e, then<br />

Coppersmith [23] proved that the attacker can find m in polynomial time. For an<br />

example, if e = 3, the attacker needs to know the top 2 -rd portion <strong>of</strong> the plaintext<br />

3<br />

m to recover the whole <strong>of</strong> m in polynomial time.<br />

2.3.4 Related Message Attack<br />

In 1995, Franklin and Reiter [42] proved that when two plaintexts are sent using<br />

the same <strong>RSA</strong> modulus N with small public exponent e, then <strong>RSA</strong> may be weak<br />

in cases where the two plaintexts are polynomially related. This result was later<br />

improved by Coppersmith, Franklin, Patarin and Reiter [26].<br />

Suppose that Alice sends the messages m 1 and m 2 = αm 1 + β to Bob where<br />

the integers α and β are known. Also suppose that Bob uses e = 3. So, we have<br />

c 1 = m 3 1 mod N and c 2 = m 3 2 mod N.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!