CryptoDB
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA
Authors: |
|
---|---|
Download: | |
Abstract: | Let (N,e) be a public key of the RSA cryptosystem, and d be the corresponding private key. In practice, we usually choose a small e for quick encryption. In this paper, we improve partial private key exposure attacks against RSA with a small public exponent e. The key idea is that under such a setting we can usually obtain more information about the prime factor of N and then by solving a univariate modular polynomial with Coppersmith's method, N can be factored in polynomial time. Compared to previous results, we reduce the number of d's leaked bits needed to mount the attack by log_2 (e) bits. Furthermore, our experiments show that for 1024-bit N, our attack can achieve the theoretical bound on a personal computer, which verified our attack. |
BibTeX
@article{cic-2024-34840, title={Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA}, journal={cic}, publisher={International Association for Cryptologic Research}, volume={1, Issue 3}, url={https://cic.iacr.org//p/1/3/29}, doi={10.62056/ahjbhey6b}, author={Yansong Feng and Abderrahmane Nitaj and Yanbin Pan}, year=2024 }