UPM Institutional Repository

New vulnerabilities of RSA modulus type N = p²q


Citation

Nek Abd Rahman, Normahirah and Kamel Ariffin, Muhammad Rezal (2016) New vulnerabilities of RSA modulus type N = p²q. In: 5th International Cryptology and Information Security Conference 2016 (CRYPTOLOGY2016), 31 May-2 June 2016, Kota Kinabalu, Sabah, Malaysia. (pp. 72-82).

Abstract

This paper proposes new attacks on RSA modulus of type N = p²q. Given k RSA moduli Nі = p²iqi for k ≥ 2 and i = 1, ..., k, the attack works when k RSA public keys (Ni, ei) are such that there exist k relations of the shape eix - Niyi = zi – (ap²i + bq²i)yi or of the shape eixi −Niy = zi −(ap²i + bq²i)y where the parameters x, xi, y, yi and zi are suitably small in terms of the prime factors of the moduli. The proposed attacks utilizing the LLL algorithm enables one to factor the k RSA moduli Ni simultaneously.


Download File

[img] Text
Cryptology2016-4.pdf
Restricted to Repository staff only

Download (351kB)

Additional Metadata

Item Type: Conference or Workshop Item (Paper)
Divisions: Faculty of Science
Institute for Mathematical Research
Publisher: Institute for Mathematical Research, Universiti Putra Malaysia
Keywords: RSA; Factorization; LLL algorithm; Simultaneous diophantine approximations
Depositing User: Nabilah Mustapa
Date Deposited: 03 Mar 2019 23:55
Last Modified: 03 Mar 2019 23:55
URI: http://psasir.upm.edu.my/id/eprint/66511
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item