Citation
Abstract
The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough within the long history of secret communications. Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. However, the generation of the RSA modulus, N=pq which requires p and q to be random primes, may accidentally entail the choice of a special type of prime called a near-square prime. This structure of N may be used unknowingly en masse in real-world applications since no current cryptographic implementation prevents its generation. In this study, we show that use of this type of prime will potentially lead to total destruction of RSA. We present three cases of near-square primes used as RSA primes, set in the form of (i) N=pq=(am−ra)(bm−rb); (ii) N=pq=(am+ra)(bm−rb) ; and (iii) N=pq=(am−ra)(bm+rb). Although (ii) and (iii) are quite similar, p and q must be within the same size range of n-bits, which results in different conditions for both cases. We formulate attacks using three different algorithms to better understand their feasibility. We also provide an efficient countermeasure that it is recommended is adopted by current cryptographic libraries with RSA implementation.
Download File
Full text not available from this repository.
Official URL or Download Paper: https://www.mdpi.com/2073-8994/14/9/1898
|
Additional Metadata
Item Type: | Article |
---|---|
Divisions: | Institute for Mathematical Research |
DOI Number: | https://doi.org/10.3390/sym14091898 |
Publisher: | MDPI AG |
Keywords: | Public-key cryptography; RSA encryption scheme; RSA primes; Cryptanalysis; Near-square prime |
Depositing User: | Ms. Che Wa Zakaria |
Date Deposited: | 22 May 2023 03:06 |
Last Modified: | 22 May 2023 03:06 |
Altmetrics: | http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.3390/sym14091898 |
URI: | http://psasir.upm.edu.my/id/eprint/102393 |
Statistic Details: | View Download Statistic |
Actions (login required)
View Item |