{"title":"Partial key exposure attacks on Prime Power RSA with non-consecutive blocks","authors":"Ziming Jiang , Yongbin Zhou , Yuejun Liu","doi":"10.1016/j.tcs.2024.114845","DOIUrl":null,"url":null,"abstract":"<div><p>Partial key exposure attacks pose a significant threat to RSA-type cryptosystems. These attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent, which is typically revealed by side-channel attacks, cold boot attacks, etc. Such partial information is often located in non-consecutive blocks. However, the majority of the proposed attacks on Prime Power RSA have only considered a single unexposed block. Meanwhile, related attacks are incapable of being expanded to multiple unexposed blocks or achieving optimal results.</p><p>In this paper, we propose partial key exposure attacks on Prime Power RSA modulus <span><math><mi>N</mi><mo>=</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>r</mi></mrow></msup><msup><mrow><mi>q</mi></mrow><mrow><mi>l</mi></mrow></msup></math></span> with <em>n</em> unknown blocks, where <span><math><mi>n</mi><mo>≥</mo><mn>2</mn></math></span>. We reduce this extended attack to solving multivariate linear modular equations and apply lattice-based approaches, including Herrmann-May's method (ASIACRYPT'08), Takayasu-Kunihiro's method (ACISP'13), and Lu-Zhang-Peng-Lin's method (ASIACRYPT'15), to solve them. Furthermore, we improve Lu et al.'s method by adding helpful polynomials and removing unhelpful polynomials to construct a better lattice basis. We also extend Lu et al.'s method by introducing a new parameter to make the lattice basis construction more flexible. Our improved and extended methods can be used for attacks when <span><math><mi>l</mi><mo>=</mo><mn>1</mn></math></span> and <span><math><mi>l</mi><mo>≥</mo><mn>1</mn></math></span>, respectively. These new attacks require less partial information than previous methods. For example, in the case where <span><math><mi>n</mi><mo>=</mo><mn>2</mn></math></span>, we reduce the amount of partial information needed from 80.7% to 77.8% when <span><math><mi>r</mi><mo>=</mo><mn>2</mn><mo>,</mo><mi>l</mi><mo>=</mo><mn>1</mn></math></span>, and from 64.0% to 44.9% when <span><math><mi>r</mi><mo>=</mo><mn>3</mn><mo>,</mo><mi>l</mi><mo>=</mo><mn>2</mn></math></span>.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114845"},"PeriodicalIF":0.9000,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical Computer Science","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0304397524004626","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Partial key exposure attacks pose a significant threat to RSA-type cryptosystems. These attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent, which is typically revealed by side-channel attacks, cold boot attacks, etc. Such partial information is often located in non-consecutive blocks. However, the majority of the proposed attacks on Prime Power RSA have only considered a single unexposed block. Meanwhile, related attacks are incapable of being expanded to multiple unexposed blocks or achieving optimal results.
In this paper, we propose partial key exposure attacks on Prime Power RSA modulus with n unknown blocks, where . We reduce this extended attack to solving multivariate linear modular equations and apply lattice-based approaches, including Herrmann-May's method (ASIACRYPT'08), Takayasu-Kunihiro's method (ACISP'13), and Lu-Zhang-Peng-Lin's method (ASIACRYPT'15), to solve them. Furthermore, we improve Lu et al.'s method by adding helpful polynomials and removing unhelpful polynomials to construct a better lattice basis. We also extend Lu et al.'s method by introducing a new parameter to make the lattice basis construction more flexible. Our improved and extended methods can be used for attacks when and , respectively. These new attacks require less partial information than previous methods. For example, in the case where , we reduce the amount of partial information needed from 80.7% to 77.8% when , and from 64.0% to 44.9% when .
期刊介绍:
Theoretical Computer Science is mathematical and abstract in spirit, but it derives its motivation from practical and everyday computation. Its aim is to understand the nature of computation and, as a consequence of this understanding, provide more efficient methodologies. All papers introducing or studying mathematical, logic and formal concepts and methods are welcome, provided that their motivation is clearly drawn from the field of computing.