F. Harahap, Yusfrizal Yusfrizal, Mutiara Sovina, Ivi Lazuly
{"title":"使用代数和网格方法对 RSA 进行密码分析","authors":"F. Harahap, Yusfrizal Yusfrizal, Mutiara Sovina, Ivi Lazuly","doi":"10.59934/jaiea.v3i3.507","DOIUrl":null,"url":null,"abstract":"This paper applies tools from the geometry of numbers to solve several problems in cryptanalysis. We use algebraic techniques to cryptanalyze several public key cryptosystems. This paper focuses on RSA and RSA-like schemes, and use tools from the theory of integer lattices to get our results. We believe that this field is still underexplored, and that much more work can be done utilizing connections between lattices and cryptography. This paper studies the security of the RSA public key cryptosystem under partial key exposure. We show that for short public exponent RSA, given a quarter of the bits of the private key an adversary can recover the entire private key. Similar results (though not as strong) are obtained for larger values of the public exponent e. Our results point out the danger of partial key exposure in the RSA public key cryptosystem. This paper shows that if the secret exponent d used in the RSA public key cryptosystem is less than N0.292, then the system is insecure. This is the first improvement over an old result of Wiener showing that when d is less than N0.25 the RSA system is insecure.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"86 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cryptanalysis of RSA Using Algebraic and Lattice Methods\",\"authors\":\"F. Harahap, Yusfrizal Yusfrizal, Mutiara Sovina, Ivi Lazuly\",\"doi\":\"10.59934/jaiea.v3i3.507\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper applies tools from the geometry of numbers to solve several problems in cryptanalysis. We use algebraic techniques to cryptanalyze several public key cryptosystems. This paper focuses on RSA and RSA-like schemes, and use tools from the theory of integer lattices to get our results. We believe that this field is still underexplored, and that much more work can be done utilizing connections between lattices and cryptography. This paper studies the security of the RSA public key cryptosystem under partial key exposure. We show that for short public exponent RSA, given a quarter of the bits of the private key an adversary can recover the entire private key. Similar results (though not as strong) are obtained for larger values of the public exponent e. Our results point out the danger of partial key exposure in the RSA public key cryptosystem. This paper shows that if the secret exponent d used in the RSA public key cryptosystem is less than N0.292, then the system is insecure. This is the first improvement over an old result of Wiener showing that when d is less than N0.25 the RSA system is insecure.\",\"PeriodicalId\":320979,\"journal\":{\"name\":\"Journal of Artificial Intelligence and Engineering Applications (JAIEA)\",\"volume\":\"86 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Artificial Intelligence and Engineering Applications (JAIEA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.59934/jaiea.v3i3.507\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59934/jaiea.v3i3.507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
本文应用数几何学工具解决密码分析中的几个问题。我们使用代数技术对几种公钥密码系统进行密码分析。本文侧重于 RSA 和类 RSA 方案,并使用整数网格理论中的工具来获得我们的结果。我们认为,这一领域仍未得到充分开发,利用网格和密码学之间的联系可以做更多的工作。本文研究了部分密钥暴露下 RSA 公钥密码系统的安全性。我们的研究表明,对于短公钥指数 RSA,只要给出四分之一比特的私钥,对手就能恢复整个私钥。我们的研究结果指出了 RSA 公钥密码系统中部分密钥暴露的危险性。本文表明,如果 RSA 公钥密码系统中使用的秘密指数 d 小于 N0.292,那么系统就不安全。这是对维纳的旧结果的首次改进,该结果表明当 d 小于 N0.25 时,RSA 系统是不安全的。
Cryptanalysis of RSA Using Algebraic and Lattice Methods
This paper applies tools from the geometry of numbers to solve several problems in cryptanalysis. We use algebraic techniques to cryptanalyze several public key cryptosystems. This paper focuses on RSA and RSA-like schemes, and use tools from the theory of integer lattices to get our results. We believe that this field is still underexplored, and that much more work can be done utilizing connections between lattices and cryptography. This paper studies the security of the RSA public key cryptosystem under partial key exposure. We show that for short public exponent RSA, given a quarter of the bits of the private key an adversary can recover the entire private key. Similar results (though not as strong) are obtained for larger values of the public exponent e. Our results point out the danger of partial key exposure in the RSA public key cryptosystem. This paper shows that if the secret exponent d used in the RSA public key cryptosystem is less than N0.292, then the system is insecure. This is the first improvement over an old result of Wiener showing that when d is less than N0.25 the RSA system is insecure.