New simultaneous Diophantine attacks on generalized RSA key equations

IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-05-23 DOI:10.1016/j.jksuci.2024.102074
Wan Nur Aqlili Ruzai , Muhammad Rezal Kamel Ariffin , Muhammad Asyraf Asbullah , Amir Hamzah Abd Ghafar
{"title":"New simultaneous Diophantine attacks on generalized RSA key equations","authors":"Wan Nur Aqlili Ruzai ,&nbsp;Muhammad Rezal Kamel Ariffin ,&nbsp;Muhammad Asyraf Asbullah ,&nbsp;Amir Hamzah Abd Ghafar","doi":"10.1016/j.jksuci.2024.102074","DOIUrl":null,"url":null,"abstract":"<div><p>RSA stands as a widely adopted method within asymmetric cryptography, commonly applied for digital signature validation and message encryption. The security of RSA relies on the challenge of integer factorization, a problem considered either computationally infeasible or highly intricate, especially when dealing with sufficiently large security parameters. Effective exploits of the integer factorization problem in RSA can allow an adversary to assume the identity of the key holder and decrypt such confidential messages. The keys employed in secure hardware are particularly significant due to the typically greater value of the information they safeguard, such as in the context of securing payment transactions. In general, RSA faces various attacks exploiting weaknesses in its key equations. This paper introduces a new vulnerability that enables the concurrent factorization of multiple RSA moduli. By working with pairs <span><math><mrow><mo>(</mo><msub><mrow><mi>N</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>,</mo><msub><mrow><mi>e</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>)</mo></mrow></math></span> and a fixed value <span><math><mi>y</mi></math></span> satisfying the Diophantine equation <span><math><mrow><msub><mrow><mi>e</mi></mrow><mrow><mi>i</mi></mrow></msub><msubsup><mrow><mi>x</mi></mrow><mrow><mi>i</mi></mrow><mrow><mn>2</mn></mrow></msubsup><mo>−</mo><msup><mrow><mi>y</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>ϕ</mi><mrow><mo>(</mo><msub><mrow><mi>N</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>)</mo></mrow><mo>=</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>i</mi></mrow></msub></mrow></math></span>, we successfully factorized these moduli simultaneously using the lattice basis reduction technique. Notably, our research expands the scope of RSA decryption exponents considered as insecure.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2000,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001630/pdfft?md5=44eab7f8011fba6e4c09c111ca655fc8&pid=1-s2.0-S1319157824001630-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of King Saud University-Computer and Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1319157824001630","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

RSA stands as a widely adopted method within asymmetric cryptography, commonly applied for digital signature validation and message encryption. The security of RSA relies on the challenge of integer factorization, a problem considered either computationally infeasible or highly intricate, especially when dealing with sufficiently large security parameters. Effective exploits of the integer factorization problem in RSA can allow an adversary to assume the identity of the key holder and decrypt such confidential messages. The keys employed in secure hardware are particularly significant due to the typically greater value of the information they safeguard, such as in the context of securing payment transactions. In general, RSA faces various attacks exploiting weaknesses in its key equations. This paper introduces a new vulnerability that enables the concurrent factorization of multiple RSA moduli. By working with pairs (Ni,ei) and a fixed value y satisfying the Diophantine equation eixi2y2ϕ(Ni)=zi, we successfully factorized these moduli simultaneously using the lattice basis reduction technique. Notably, our research expands the scope of RSA decryption exponents considered as insecure.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对广义 RSA 密钥方程的新同步 Diophantine 攻击
RSA 是非对称密码学中被广泛采用的一种方法,通常用于数字签名验证和信息加密。RSA 的安全性依赖于整数因式分解的挑战,这个问题要么在计算上不可行,要么非常复杂,尤其是在处理足够大的安全参数时。有效利用 RSA 中的整数因式分解问题,可以让对手假定密钥持有者的身份,并解密此类机密信息。安全硬件中使用的密钥尤其重要,因为它们所保护的信息通常价值更高,例如在确保支付交易安全的情况下。一般来说,RSA 面临着各种利用其密钥方程弱点的攻击。本文介绍了一种新的漏洞,它可以对多个 RSA 模同时进行因式分解。通过处理成对(Ni,ei)和满足 Diophantine 方程 eixi2-y2ϕ(Ni)=zi 的固定值 y,我们利用晶格基还原技术成功地同时对这些模进行了因式分解。值得注意的是,我们的研究扩大了被认为不安全的 RSA 解密指数的范围。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
10.50
自引率
8.70%
发文量
656
审稿时长
29 days
期刊介绍: In 2022 the Journal of King Saud University - Computer and Information Sciences will become an author paid open access journal. Authors who submit their manuscript after October 31st 2021 will be asked to pay an Article Processing Charge (APC) after acceptance of their paper to make their work immediately, permanently, and freely accessible to all. The Journal of King Saud University Computer and Information Sciences is a refereed, international journal that covers all aspects of both foundations of computer and its practical applications.
期刊最新文献
Heterogeneous emotional contagion of the cyber–physical society A novel edge intelligence-based solution for safer footpath navigation of visually impaired using computer vision Improving embedding-based link prediction performance using clustering A sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration RAPID: Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1