Partial Key Exposure Attacks on Unbalanced RSA with the CRT (Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In RSA public-key cryptosystem, a small private key is often preferred for efficiency but such a small key could degrade security. Thus the Chinese Remainder Theorem (CRT) is tactically used, especially in time-critical applications like smart cards. As for using the CRT in RSA, care must be taken to resist partial key exposure attacks. While it is common to choose two distinct primes with similar size in RSA, May has shown that a composite modulus N can be factored in the balanced RSA with the CRT of half of the least (or most) significant bits of a private key is revealed with a small public key. However, in the case that efficiency is more critical than security, such as smart cards, unbalanced primes might be chosen. Thus, we are interested in partial key exposure attacks to the unbalanced RSA with the CRT. In this paper, we obtain the similar results as the balanced RSA. We show that in the unbalanced RSA if the N^<1/4> least (or most) significant bits are revealed, a private key can be recovered in polynomial time under a small public key.
- 社団法人電子情報通信学会の論文
- 2006-02-01
著者
-
Park Young-ho
The Faculty Of The Department Of Information Security Sejong Cyber University
-
KWON Taekyoung
School of Computer Engineering, Sejong University
-
LEE Hee
the Department of Mathematics, Kangnam University
-
KWON Taekyoung
the Faculty of the School of Computer Engineering, Sejong University
-
Lee Hee
The Department Of Mathematics Kangnam University
-
Kwon Taekyoung
School Of Computer Engineering Sejong University
-
Kwon Taekyoung
The Faculty Of The School Of Computer Engineering Sejong University
関連論文
- Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
- An Efficient Signature Scheme with Fast Online Signing
- Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
- New Hardware Architecture for Multiplication over GF(2^m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography
- Partial Key Exposure Attacks on Unbalanced RSA with the CRT (Information Security)
- Novel Two Step Background Suppression for 2-D LWIR Application(Electronic Circuits)