UPM Institutional Repository

Concurrent factorization of RSA moduli via weak key equations


Citation

Ruzai, Wan Nur Aqlili and Ying, You and Muhammad, Khairun Nisak and Asbullah, Muhammad Asyraf and Ariffin, Muhammad Rezal Kamel (2024) Concurrent factorization of RSA moduli via weak key equations. AIMS Mathematics, 9 (10). pp. 28211-28231. ISSN 2473-6988; eISSN: 2473-6988

Abstract

The Rivest-Shamir-Adleman (RSA) algorithm is a widely utilized technique in asymmetric cryptography, primarily for verifying digital signatures and encrypting messages. Its security relies on the integer factorization problem’s difficulty, which is computationally infeasible with large security parameters. However, this study revealed scenarios where an attacker can concurrently factorize multiple RSA moduli Ni = piqi under specific conditions. The attack is feasible when the attacker possesses a set of RSA key pairs with certain flaws, allowing each Ni to be factored in polynomial time. We identified vulnerabilities in RSA keys that satisfy particular equations by applying Diophantine approximation and Coppersmith’s lattice-based technique. For instance, the study demonstrates that if RSA public exponents ei and moduli Ni adhere to eir − (Ni − pi − qi + ui)si = ti, where r, si, ui, and ti are small integers, then all Ni can be factorized simultaneously. Additionally, another vulnerability arises when RSA parameters satisfy eiri − s(Ni − pi − qi + ui) = ti, enabling concurrent factorization with small integers s, ri, ui, and ti. This research expands the understanding of RSA security by identifying specific conditions under which RSA public-key pairs can be compromised. These findings are relevant to the broader field of cryptography and the ongoing efforts to secure communication systems against sophisticated adversaries.


Download File

[img] Text
114924.pdf - Published Version
Available under License Creative Commons Attribution.

Download (290kB)

Additional Metadata

Item Type: Article
Divisions: Faculty of Science
Institute for Mathematical Research
Centre for Foundation Studies in Science of Universiti Putra Malaysia
DOI Number: https://doi.org/10.3934/math.20241368
Publisher: American Institute of Mathematical Sciences
Keywords: Asymmetric cryptography; Continued fractions; Diophantine approximations; Lattice cryptanalysis; RSA
Depositing User: Ms. Nur Aina Ahmad Mustafa
Date Deposited: 12 Feb 2025 02:21
Last Modified: 12 Feb 2025 02:21
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.3934/math.20241368
URI: http://psasir.upm.edu.my/id/eprint/114924
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item