Abstract
Rogue certificate authorities (RCA) are third-party entities that intentionally produce key pairs that satisfy publicly known security requirements but contain weaknesses only known to the RCA. This work analyses the Murru–Saettone RSA variant scheme that obtains its key pair from a potential RCA methodology. The Murru–Saettone scheme is based on the cubic Pell equation . The public, e, and private, d key generation process uses the secret parameter in place of the standard Euler–phi function , where . We prove that, upon obtaining an approximation of , we are able to identify the provided key pair that was maliciously provided even if the private key d size is approximate to . In fact, we are able to factor the modulus .
1. Introduction
The security of a symmetric encryption scheme highly depends on the safety of the secret key transmission between parties involved in the communication. Other than direct interaction between parties, the utilization of asymmetric encryption schemes is the norm in modern communication. Central to the production of the public and private key pair of an asymmetric encryption scheme is the Certificate Authority (CA). Parties should have full trust in the CA to provide secure key pairs. Nevertheless, it is wise to conduct due diligence on the key pairs received. As such, for a communication topology with large participation, it is not surprising that the security of a symmetric encryption scheme will fall back on the strength of the asymmetric encryption scheme being utilized. As such, studies on the asymmetric cryptosystem utilized must be conducted to ensure that symmetric encryption remains secure.
RSA encryption/digital signing scheme is currently the world’s most widely used public-key cryptosystem. The standard RSA cryptosystem comprises three distinct algorithms: key generation, encryption, and decryption [1]. The security of RSA is mainly based on the hardness of factoring large composite integers, which is modulus where p and q are two large prime numbers of the same bit size. It is well known that RSA is not secure if the process of generating the public parameters and the private parameters do not satisfy certain conditions [2,3,4,5,6]. For instance, the RSA cryptosystem is vulnerable when employing continued fractions if such decryption exponent d is less than , by a classical finding in [2]. Additionally, [3] has recovered the secret key if and explicitly for . Eventually, by using Coppersmith’s technique to obtain small solutions of modular univariate polynomials, ref. [5] refined the bound to . From then on, ref. [4] identified that it is possible to raise the bound from to . The new bound is generated in part from the constraint that both primes number of p and q will have almost the same size of bit length. Moreover, ref. [6] has maximized the small root bounds to small secret exponent RSA using linearization and applications. To the extent of improving the implementation of the RSA cryptosystem, many schemes with various techniques have been proposed. As a result, a lot of RSA variant cryptosystems arise [7,8,9,10,11,12].
The existence of RCA is the underlying motivation behind the identification of weak public keys. RCA is defined by [13] as an entity issuing legitimate certificates being trusted by web browsers and users but contains hidden weaknesses. There is a window of vulnerability with the existing public key infrastructure between the time a rogue certificate is issued and when it is discovered. Likewise, an RCA can publish a fraudulent RSA digital certificate using these keys without users noticing its anomaly. As the weak keys satisfy the conditions established in the key generation process, the validity of these fraudulent certificates can be convincing. Hence, the cryptosystem continues to operate discreetly using the keys, i.e., suppose an adversary knows about the existence of these specific certificates, then the adversary can find the private keys corresponding to the public keys without knowing any information about the private keys.
In relation to the above, this paper discloses potential RCA methodology upon an RSA variant cryptosystem constructed from a cubic field connected to the cubic Pell equation that was invented by Murru–Saettone [14]. Our identified conditions will allow an adversary to factor the modulus N if the user has been provided with keys through the potential RCA methodology.
The framework of this paper is as follows. In Section 2, we summarize the Murru–Saettone scheme. Section 3 describes some important tools and useful lemmas, respectively. Moreover, in the Section 4 and Section 5, we present our main result, which says that the Murru–Saettone scheme is not secure with experimental results. Finally, we conclude the paper in Section 6.
2. The Scheme of Murru and Saettone
In this section, we summarize the Murru and Saettone cryptosystem [14] along with the key generation, encryption, and decryption procedures.
Key Generation:
- Choose two random prime numbers p and q of bit-size k;
- Set and ;
- Choose a random integer with ;
- Choose a non-cube integer r in , and ;
- Compute ;
- Return the public parameters as and the private parameters as .
Encryption:
- Given a pair of messages and in ;
- Compute ;
- Return the ciphertext as .
Decryption:
- Given a pair of ciphertexts and ;
- Compute ;
- Return the message as .
3. Preliminaries
In this section, we put forward preliminary concepts needed.
Definition 1.
The expression of continued fractions expansion of can be written in these forms
which can also be written as . The process of calculating the continued fractions expansion would be executed in polynomial time if ξ is a rational number and thus . The convergents of ξ are the fractions denoted by for . An important result on continued fractions that will be used is the following theorem.
Theorem 1.
Let ξ be a positive number. Suppose that and
Then is a convergent of the continued fractions expansion of ξ.
The following result gives the bounds for p, and q in terms of N (See [15]).
Lemma 1.
Let be the product of two unknown integers with . Then
In the following, we set . The former lemma can be used to find a good approximation for . The following result shows that one can factor the modulus if is known [15].
Proposition 1.
Let be the product of two unknown integers with . Suppose that is known. Then,
where
Definition 2.
Let and be the lower bound and the upper bound of ψ. Then we define .
The next remark shows how we can find the best current approximation values for and .
Remark 1.
From Nitaj [16], we know that . This means
as . Hence, the best current approximation for is and for is .
The following lemmas and theorem show conditions to be fulfilled by parameters in the equation .
Lemma 2.
Let with . Let e satisfy the equation where X and Y are positive integers. If
then is a convergent function of .
Proof.
Consider the following equation
Theorem 2.
Let with . Let e satisfies the equation where X, Y are positive integers. If
then N can be factored in polynomial time.
Proof.
Suppose e satisfies an equation . Let X, Y and Z satisfy the conditions in Lemma 3, then we can find the values of X and Y by computing . From the values of X and Y, we can have the value of Z by computing . From the values of Z, we define Equation (5) as
Since, then
Based on Proposition 1, we can factor N in polynomial time. □
4. Generating Weak Murru–Saettone Cryptosystem Public Keys by RCA: Case
In this section, we show how a RCA can generate weak Murru–Saettone cryptosystem public key pairs. By using conditions in Lemma 3 coupled with results from Theorem 3, a RCA can build an algorithm that produces such weak Murru–Saettone cryptosystem public keys. The Algorithm 1 is as follows:
| Algorithm 1. Generating weak Murru–Saettone cryptosystem public keys via Lemma 3 and Theorem 3 |
|
From Theorem 3, given , a thorough user can utilize the following algorithm to determine the security of the provided key pair, whether it was generated via Algorithm 1 or not. In fact, the following algorithm will factor the modulus . Algorithm 2 is as follows:
| Algorithm 2. Factoring weak Murru–Saettone cryptosystem moduli for adversary |
|
The following is an example to illustrate Algorithm 2 for the case .
Example 1.
We use 512-bits for modulus, N in this example. Specifically, an adversary is given
and
Then the adversary can compute the following parameters
Using values of e, N and A, the adversary obtain the continued fraction expansion of which are
Our algorithm stops at the 13th convergent . Taking , the adversary computes
Using value of ζ, the adversary solve the Equations (5) and (1) to get S, p and q respectively.
and
5. Generating Weak Murru–Saettone Cryptosystem Public Keys by RCA: Case
In this section, we show that the condition in the previous section can be extended to .
Lemma 3.
Let with . Let e satisfies the equation where X and Y are positive integers. If
then is a convergent function of .
Proof.
Consider the following equation
Let . Then, divide (8) by , we obtain
since , and . If , then . As will always be a positive value, rearranging (9), we obtain
which satisfies Theorem 1. This terminates the proof. □
Theorem 3.
Let with . Let e satisfies the equation where X, Y are positive integers. If
then N can be factored in polynomial time.
Proof.
Suppose e satisfies an equation . Let X, Y and Z satisfy the conditions in Lemma 3, then we can find the values of X and Y by computing . From the values of X and Y, we can have the value of Z by computing . From the values of Z, we define Equation (5) as
Since, then
Based on Proposition 1, we can factor N in polynomial time. □
Remark 2.
A RCA can build an algorithm that produces such weak public keys by using Algorithm 1 by changing step 6 and 7 instead of
and
respectively.
The following is an example to illustrate Algorithm 2 for the case .
Example 2.
We use 512-bits for modulus, N in this example. Specifically, an adversary is given
and
Then the adversary can compute the following parameters
Using values of e, N and A, the adversary obtain the continued fraction expansion of which are
Our algorithm stops at the 15th convergent . Taking , the adversary computes
Using value of ζ, the adversary solve the Equations (5) and (4) to get S, p and q respectively.
and
Remark 3.
The above examples uses two random prime numbers with and . By using the values of p and q in the examples, the adversary can easily compute the private exponent . Therefore, based on the examples, it is difficult for the user to identify that the rogue digital certificate because all the public and private parameters generated satisfy the conditions imposed during the key generation process.
6. Conclusions
We have constructed novel strategies to identify whether the Murru–Saettone RSA variant cryptosystem key pair was generated by a potential RCA. Based on our findings, if the following condition of or where Z is an approximation of satisfies, then Murru–Saettone RSA variant cryptosystem is vulnerable to an attack. An adversary will be able to successfully execute an attack in polynomial time by using continued fractions algorithm to factor the modulus N without having any information of the private keys upon the public key pair. Furthermore, by factoring modulus N, an adversary will be able to compute the value of and, finally, acquire the private key, .
Author Contributions
Conceptualization, Z.M. and M.R.K.A.; formal analysis, Z.M.; funding acquisition, Z.M.; investigation, Z.M.; methodology, Z.M. and M.R.K.A.; software, Z.M.; supervision, M.R.K.A. and A.H.A.G.; validation, Z.M., M.R.K.A., A.H.A.G. and N.R.S.; writing—original draft, Z.M.; writing—review & editing, Z.M., M.R.K.A., A.H.A.G. and N.R.S.. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by Universiti Putra Malaysia under Putra Grant with project number GP-IPM/2021/9699900.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Wiener, M. Cryptanalysis of Short RSA Secret Exponents. IEEE Trans. Inf. Theory 1990, 36, 553–558. [Google Scholar] [CrossRef] [Green Version]
- Bunder, M.; Tonien, J. A new improved attack on RSA. In Proceedings of the 5th International Cryptology and Information Security Conference 2016, Sabah, Malaysia, 31 May–2 June 2016; pp. 101–110. [Google Scholar]
- Susilo, W.; Tonien, J.; Yang, G. A generalised bound for the Wiener attack on RSA. J. Inf. Secur. Appl. 2020, 53, 102531. [Google Scholar] [CrossRef]
- Boneh, D.; Durfee, G. Cryptanalysis of RSA with private key d less than N0.292. IEEE Trans. Inf. Theory 2000, 46, 1339–1349. [Google Scholar] [CrossRef]
- Herrmann, M.; May, A. Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA. In Proceedings of the Public Key Cryptography—PKC 2010, Paris, France, 26–28 May 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 53–69. [Google Scholar]
- Takagi, T. Fast RSA-type cryptosystem modulo pkq. In Proceedings of the Advances in Cryptology—CRYPTO’98, Santa Barbara, CA, USA, 23–27 August 1998; Krawczyk, H., Ed.; Springer: Berlin/Heidelberg, Germany, 1998; pp. 318–326. [Google Scholar]
- Quisquater, J.J.; Couvreur, C. Fast decipherment algorithm for RSA public-key cryptosystem. Electron. Lett. 1982, 18, 905–907. [Google Scholar] [CrossRef]
- Asbullah, M.A.; Kamel Ariffin, M.R.; Mahad, Z.; Daud, M.A. (In)security of the cryptosystem for transmitting large data. In Proceedings of the ICSCA’19: The 2019 8th International Conference on Software and Computer Applications, Penang, Malaysia, 19–21 February 2019; Volume Part F147956, pp. 91–94. [Google Scholar] [CrossRef]
- Mahad, Z.; Asbullah, M.; Ariffin, M. Efficient methods to overcome rabin cryptosystem decryption failure. Malays. J. Math. Sci. 2017, 11, 9–20. [Google Scholar]
- Ariffin, M.; Asbullah, M.; Abu, N.; Mahad, Z. A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q. Malays. J. Math. Sci. 2013, 7, 19–37. [Google Scholar]
- Elkamchouchi, H.; Elshenawy, K.; Shaban, H. Extended RSA cryptosystem and digital signature schemes in the domain of Gaussian integers. In Proceedings of the The 8th International Conference on Communication Systems, Singapore, 28 November 2002; pp. 91–95. [Google Scholar] [CrossRef]
- Dong, Z.; Kane, K.; Camp, L.J. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Trans. Priv. Secur. 2016, 19, 1–31. [Google Scholar] [CrossRef]
- Murru, N.; Saettone, F.M. A Novel RSA-Like Cryptosystem Based on a Generalization of the Rédei Rational Functions. In Proceedings of the Number-Theoretic Methods in Cryptology, Warsaw, Poland, 11–13 September 2018; Kaczorowski, J., Pieprzyk, J., Pomykała, J., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 91–103. [Google Scholar]
- Nitaj, A. Another Generalization of Wiener’s Attack on RSA. In Proceedings of the Progress in Cryptology—AFRICACRYPT 2008, Casablanca, Morocco, 11–14 June 2008; Vaudenay, S., Ed.; Springer: Berlin/Heidelberg, Germany, 2008; pp. 174–190. [Google Scholar]
- Nitaj, A.; Ariffin, M.R.B.K.; Adenan, N.N.H.; Abu, N.A. Classical Attacks on a Variant of the RSA Cryptosystem. In Proceedings of the Progress in Cryptology—LATINCRYPT 2021, Bogotá, Colombia, 6–8 October 2021; Longa, P., Ràfols, C., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 151–167. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).