How to Generalize RSA Cryptanalyses
Atsushi Takayasu and Noboru Kunihiro The University of Tokyo, Japan AIST, Japan
PKC2016@Taipei
1/19
How to Generalize RSA Cryptanalyses Atsushi Takayasu and Noboru - - PowerPoint PPT Presentation
PKC2016@Taipei How to Generalize RSA Cryptanalyses Atsushi Takayasu and Noboru Kunihiro The University of Tokyo, Japan AIST, Japan 1/19 Background 2 /19 RSA Public key: , Secret key: (, , ) Key generation: =
PKC2016@Taipei
1/19
2 /19
Public key: π, π Secret key: (π, π, π) Key generation: π = ππ and ππ = 1 mod (π β 1)(π β 1) οΌ One of the most famous cryptosystems οΌ A number of paper study the security.
3 /19
Small secret exponent
The most/least significant bits of π disclose the factorization of π. οΌ These attacks are based on Coppersmithβs method.
4 /19
RSA Takagi RSA Prime Power RSA PK
SK
KG π = ππ π = ππ π π = ππ π ππ = 1 mod (π β 1)(π β 1) ππ = 1 mod (π β 1)(π β 1) ππ = 1 mod ππ β1(π β 1)(π β 1) οΌ The variants enable faster decryption using CRT. οΌ When π = 1, both variants are the same as RSA.
5 /19
RSA Takagiβs RSA Prime Power RSA Small Secret Exponent [BD00] [IKK08] [May04], [LZPL15], [Sar15] Partial Key Exposure [EJMW05], [TK14] [HHX+14] [May04], [LZPL15], [Sar15], [EKU15] οΌ When π = 1, only [IKK08] achieves the same bound as the best attacks on RSA.
6 /19
best attacks on RSA?
to follow.
7 /19
best attacks on RSA?
to follow. Are there easy-to-understand generic transformations that convert the attacks on RSA to Takagiβs RSA and the prime power RSA?
7 /19
We propose transformations for both the Takagiβs RSA and the prime power RSA which are very simple and give improved results. β Simpler analyses of [IKK08], [Sar15] β Better bounds than [HHX+14], [Sar15], [EKU15] β Some evidence of optimality
8 /19
[HHX+14] Our Improvements
9 /19
logπ π Exposed proportion of π
9 /19
logπ π [HHX+14] Our Improvements Exposed proportion of π
9 /19
logπ π [LZPL15] [Sar15] Our Improvements Exposed proportion of π
10 /19
To find small roots of a bivariate modular equation
where π¦ < π and π§ < Y,
11 /19
To find small roots of a bivariate modular equation
where π¦ < π and π§ < Y,
(π¦ , π§ ) modulo ππ.
11 /19
To find small roots of a bivariate modular equation
where π¦ < π and π§ < Y,
(π¦ , π§ ) modulo ππ.
become β1
β² π¦, π§ and β2 β² (π¦, π§) satisfying
the original roots can be recovered.
11 /19
β² π¦, π§ and β2 β² (π¦, π§) that are the integer
linear combinations of β1 π¦, π§ , β¦ , βπ(π¦, π§) and the norms
12 /19
β² π¦, π§ and β2 β² (π¦, π§) that are the integer
linear combinations of β1 π¦, π§ , β¦ , βπ(π¦, π§) and the norms
and π2β² that are the integer linear combinations of π1, β¦, ππ and the Euclidean norms are small.
12 /19
β² π¦, π§ and β2 β² (π¦, π§) that are the integer
linear combinations of β1 π¦, π§ , β¦ , βπ(π¦, π§) and the norms
and π2β² that are the integer linear combinations of π1, β¦, ππ and the Euclidean norms are small. οΌ Build a lattice whose basis consists of coefficients of β1 π¦π, π§π , β¦ , βπ(π¦π, π§π) and apply the LLL.
12 /19
whose root (β, β π + π ) discloses the factorization of π.
13 /19
whose root (β, β π + π ) discloses the factorization of π. Polynomials
οΌ The resulting lattice constructions are well-analyzed.
13 /19
whose root (β, β π + π ) discloses the factorization of π. Polynomials
οΌ The resulting lattice constructions are well-analyzed.
13 /19
14 /19
whose root (β, π, π) discloses the factorization of π.
(1, π¦, π¦π§1, π¦π§2, π¦π§1π§2)
π π§2 = π
15 /19
whose root (β, π, π) discloses the factorization of π. Polynomials
π β1π§2 β π¦ππ§ 1 πππ£ π¦, π§1, π§2 ππβπ£
15 /19
whose root (β, π, π) discloses the factorization of π. Polynomials
π β1π§2 β π¦ππ§ 1 πππ£ π¦, π§1, π§2 ππβπ£
15 /19
π β1 π§1 β 1 (π§2 β 1) mod π
whose roots (β, π, π) offer the factorization of π.
(1, π¦, π¦π§1
π β1, π¦π§1 π , π¦π§1 π β1π§2)
π π§2 = π
16 /19
π β1 π§1 β 1 (π§2 β 1) mod π
whose roots (β, π, π) offer the factorization of π. Polynomials
π, π§1π§2 π, β¦ , π§1 π β1π§2 π, π§1 π β1π§2 π+1
1 πππ£ π¦, π§1, π§2 ππβπ£
16 /19
1, π§2, π§1π§2, β¦ , π§1
π β1π§2
17 /19
π§2
π, π§1π§2 π, β¦ , π§1 π β1π§2 π, π§1 π β1π§2 π+1
18 /19
RSA. As applications, we propose small secret exponent attacks and partial key exposure attacks on the variants. οΌ Further applications of our transformations? οΌ Better attacks can be obtained from other frameworks?
19 /19