Citation
Abstract
The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. It is important to further study the weak characteristics of the RSA to ensure correct utilisation in order not to be susceptible to adversaries. In this paper, we give detailed analysis on security of the Murru-Saettone variant of the RSA cryptosystem that utilised a cubic Pell ed−k(p2+p+1)(q2+q+1)=1 as key equation and N=pq as RSA modulus. We propose some attacks on this variant when the prime difference |p−q| is small. Our first approach is to utilise the continued fractions algorithm to determine the parameter d which enables us to determine the secret p and q . Our second approach considers the Coppersmith's method and lattice basis reduction to factor the modulus N . Our attacks improve recent cryptanalyses on the cubic Pell equation variant of RSA. Furthermore, our attacks prove that under small prime difference scenario, the number of susceptible private exponents for the cubic Pell equation variant of RSA is much larger than the standard RSA.
Download File
Full text not available from this repository.
Official URL or Download Paper: https://ieeexplore.ieee.org/document/9775686
|
Additional Metadata
Item Type: | Article |
---|---|
Divisions: | Institute for Mathematical Research |
DOI Number: | https://doi.org/10.1109/ACCESS.2022.3175519 |
Publisher: | Institute of Electrical and Electronics Engineers |
Keywords: | Continued fractions; Coppersmith’s method; Cubic Pell equation; Factorization; RSA |
Depositing User: | Ms. Nuraida Ibrahim |
Date Deposited: | 05 Dec 2023 04:11 |
Last Modified: | 05 Dec 2023 04:11 |
Altmetrics: | http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.1109/ACCESS.2022.3175519 |
URI: | http://psasir.upm.edu.my/id/eprint/103149 |
Statistic Details: | View Download Statistic |
Actions (login required)
View Item |