A new LSB attack on special-structured RSA primes
Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest–Shamir–Adleman (RSA) cryptosystem is highly regarded as one of the most deployed public-key cryptosyst...
保存先:
主要な著者: | , , |
---|---|
フォーマット: | 論文 |
言語: | English |
出版事項: |
MDPI
2020
|
オンライン・アクセス: | http://psasir.upm.edu.my/id/eprint/36978/1/36978.pdf http://psasir.upm.edu.my/id/eprint/36978/ https://www.mdpi.com/2073-8994/12/5/838 |
タグ: |
タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
|
id |
my.upm.eprints.36978 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.369782020-06-16T06:38:45Z http://psasir.upm.edu.my/id/eprint/36978/ A new LSB attack on special-structured RSA primes Abd Ghafar, Amir Hamzah Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest–Shamir–Adleman (RSA) cryptosystem is highly regarded as one of the most deployed public-key cryptosystem today. Previous attacks on the cryptosystem focus on the effort to weaken the hardness of integer factorization problem, embedded in the RSA modulus, N=pq . The adversary used several assumptions to enable the attacks. For examples, p and q which satisfy Pollard’s weak primes structures and partial knowledge of least significant bits (LSBs) of p and q can cause N to be factored in polynomial time, thus breaking the security of RSA. In this paper, we heavily utilized both assumptions. First, we assume that p and q satisfy specific structures where p=am+rp and q=bm+rq for a,b are positive integers and m is a positive even number. Second, we assume that the bits of rp and rq are the known LSBs of p and q respectively. In our analysis, we have successfully factored N in polynomial time using both assumptions. We also counted the number of primes that are affected by our attack. Based on the result, it may poses a great danger to the users of RSA if no countermeasure being developed to resist our attack. MDPI 2020 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/36978/1/36978.pdf Abd Ghafar, Amir Hamzah and Kamel Ariffin, Muhammad Rezal and Asbullah, Muhammad Asyraf (2020) A new LSB attack on special-structured RSA primes. Symmetry, 12 (5). art. no. 838. pp. 1-13. ISSN 2073-8994 https://www.mdpi.com/2073-8994/12/5/838 10.3390/sym12050838 |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest–Shamir–Adleman (RSA) cryptosystem is highly regarded as one of the most deployed public-key cryptosystem today. Previous attacks on the cryptosystem focus on the effort to weaken the hardness of integer factorization problem, embedded in the RSA modulus, N=pq . The adversary used several assumptions to enable the attacks. For examples, p and q which satisfy Pollard’s weak primes structures and partial knowledge of least significant bits (LSBs) of p and q can cause N to be factored in polynomial time, thus breaking the security of RSA. In this paper, we heavily utilized both assumptions. First, we assume that p and q satisfy specific structures where p=am+rp and q=bm+rq for a,b are positive integers and m is a positive even number. Second, we assume that the bits of rp and rq are the known LSBs of p and q respectively. In our analysis, we have successfully factored N in polynomial time using both assumptions. We also counted the number of primes that are affected by our attack. Based on the result, it may poses a great danger to the users of RSA if no countermeasure being developed to resist our attack. |
format |
Article |
author |
Abd Ghafar, Amir Hamzah Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf |
spellingShingle |
Abd Ghafar, Amir Hamzah Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf A new LSB attack on special-structured RSA primes |
author_facet |
Abd Ghafar, Amir Hamzah Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf |
author_sort |
Abd Ghafar, Amir Hamzah |
title |
A new LSB attack on special-structured RSA primes |
title_short |
A new LSB attack on special-structured RSA primes |
title_full |
A new LSB attack on special-structured RSA primes |
title_fullStr |
A new LSB attack on special-structured RSA primes |
title_full_unstemmed |
A new LSB attack on special-structured RSA primes |
title_sort |
new lsb attack on special-structured rsa primes |
publisher |
MDPI |
publishDate |
2020 |
url |
http://psasir.upm.edu.my/id/eprint/36978/1/36978.pdf http://psasir.upm.edu.my/id/eprint/36978/ https://www.mdpi.com/2073-8994/12/5/838 |
_version_ |
1671341082231701504 |
score |
13.251813 |