UPM Institutional Repository

On (unknowingly) using near-square RSA primes


Citation

Ruzai, Wan Nur Aqlili and Abd Ghafar, Amir Hamzah and Salim, Nur Raidah and Kamel Ariffin, Muhammad Rezal (2022) On (unknowingly) using near-square RSA primes. Multidisciplinary Digital Publishing Institute MDPI, 14 (9). art. no. 1898. pp. 1-18. ISSN 2073-8994

Abstract

The invention in 1978 of the first practical asymmetric cryptosystem known as RSA was a breakthrough within the long history of secret communications. Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. However, the generation of the RSA modulus, N=pq which requires p and q to be random primes, may accidentally entail the choice of a special type of prime called a near-square prime. This structure of N may be used unknowingly en masse in real-world applications since no current cryptographic implementation prevents its generation. In this study, we show that use of this type of prime will potentially lead to total destruction of RSA. We present three cases of near-square primes used as RSA primes, set in the form of (i) N=pq=(am−ra)(bm−rb); (ii) N=pq=(am+ra)(bm−rb) ; and (iii) N=pq=(am−ra)(bm+rb). Although (ii) and (iii) are quite similar, p and q must be within the same size range of n-bits, which results in different conditions for both cases. We formulate attacks using three different algorithms to better understand their feasibility. We also provide an efficient countermeasure that it is recommended is adopted by current cryptographic libraries with RSA implementation.


Download File

Full text not available from this repository.
Official URL or Download Paper: https://www.mdpi.com/2073-8994/14/9/1898

Additional Metadata

Item Type: Article
Divisions: Institute for Mathematical Research
DOI Number: https://doi.org/10.3390/sym14091898
Publisher: MDPI AG
Keywords: Public-key cryptography; RSA encryption scheme; RSA primes; Cryptanalysis; Near-square prime
Depositing User: Ms. Che Wa Zakaria
Date Deposited: 22 May 2023 03:06
Last Modified: 22 May 2023 03:06
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.3390/sym14091898
URI: http://psasir.upm.edu.my/id/eprint/102393
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item