Concurrent factorization of RSA moduli via weak key equations.

Autor: Ruzai, Wan Nur Aqlili, Ying, You, Muhammad, Khairun Nisak, Asbullah, Muhammad Asyraf, Ariffin, Muhammad Rezal Kamel
Předmět:
Zdroj: AIMS Mathematics; 2024, Vol. 9 Issue 10, p1-21, 21p
Abstrakt: The Rivest-Shamir-Adleman (RSA) algorithm is a widely utilized technique in asymmetric cryptography, primarily for verifying digital signatures and encrypting messages. Its security relies on the integer factorization problem's difficulty, which is computationally infeasible with large security parameters. However, this study revealed scenarios where an attacker can concurrently factorize multiple RSA moduli N i = p i q i under specific conditions. The attack is feasible when the attacker possesses a set of RSA key pairs with certain flaws, allowing each N i to be factored in polynomial time. We identified vulnerabilities in RSA keys that satisfy particular equations by applying Diophantine approximation and Coppersmith's lattice-based technique. For instance, the study demonstrates that if RSA public exponents e i and moduli N i adhere to e i r − (N i − p i − q i + u i) s i = t i , where r , s i , u i , and t i are small integers, then all N i can be factorized simultaneously. Additionally, another vulnerability arises when RSA parameters satisfy e i r i − s (N i − p i − q i + u i) = t i , enabling concurrent factorization with small integers s , r i , u i , and t i . This research expands the understanding of RSA security by identifying specific conditions under which RSA public-key pairs can be compromised. These findings are relevant to the broader field of cryptography and the ongoing efforts to secure communication systems against sophisticated adversaries. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index