Abstract
This paper describes an attack on the Rivest, Shamir and Adleman (RSA) cryptosystem utilizing the modulus where p and q are two large balanced primes. Let be the integers such that be their multiplicative inverses. Based on the two key equations and where , our attack works when the primes share a known amount of least significant bits (LSBs) and the private exponents share an amount of most significant bits (MSBs). We apply the extended strategy of Jochemsz–May to find the small roots of an integer polynomial and show that N can be factored if Our attack improves the bounds of some previously proposed attacks that makes the RSA variant vulnerable.
1. Introduction
In 1978, security in transmitting data between two parties is imperative to avert the information from being expose to an unauthorised person. Rivest, Shamir and Adleman came out with a brilliant public key cryptosystem design. It is also known as an asymmetric cryptosystem as it uses different keys for encrypting and decrypting the data. The cryptosystem is called RSA [1]. For encryption, the public parameters N and e are needed where and e is an integer that is relatively prime with where is the Euler totient function. The private key d is an integer satisfying is used for the decryption process. The security of the RSA cryptosystem relies on three hard problems which are the integer factorization problem of , solving the root problem of and solving the diophantine key equation given by .
The efficiency of the RSA algorithm depends on the cost and execution time for encryption and decryption processes. In order to reduce the cost and to accelerate the decryption process, one thus tends to use small decryption exponents. However in 1990, Wiener [2] found out that the RSA cryptosystem is vulnerable when the decryption exponent d is too small. Wiener proved that by using continued fractions, one can factor out N if the . Since then, researchers worked on the same purpose in order to improve the bound of d. There are different approaches in their analysis. For instance, Boneh and Durfee [3] obtained a better bound of by using Coppersmith’s method [4] to find small solutions of modular polynomial equations.
Multi-Power RSA is one of the variants of RSA whereby the modulus for is utilized. This type of modulus provides advantage for both key generation and the decryption algorithms provided the Chinese Remainder Theorem is utilized [5]. Among cryptosystems that utilize this fact are designs by Takagi [6], Ariffin et al. [7] and Asbullah et al. [8]. Through their papers, the designers managed to show that their cryptosystems had low computing costs compared to the standard RSA. As such, the study of the Integer Factorization Problem of becomes important. Boneh et al. [9] proved that is factorable for large r, when . Since then, many attackers made an attempt to cryptanalyse the multi-power RSA modulus. We only stated the results from these three former attacks which are May [10], Sarkar [11], and Lu et al. [12] because we aim to improve their unsafe bound of their decryption exponent. The following table presents the bounds from these former attacks and the method that they have been used. Note that these former attacks focused on the modulus but we only consider the bound for for comparison purpose.
Another flaw of the RSA cryptosystem is when the information of MSB(s) or LSB(s) of the private key d or secret primes are leaked to a third party which could lead to recovery of the entire private key and thus break the cryptosystem. This type of attack is called partial key exposure attacks. Boneh, Durfee and Frankel [13] in 1998 showed that only by knowing a quarter of the private key d, it is adequate for them to recover the whole value of d by using Coppersmith’s technique. Sun et al. [14] and Zhao et al. [15] also showed that using primes that share either most or least significant bits are insecure and the modulus can be factored in polynomial time. Following through in 2014, Nitaj et al. [16] came out with an idea to attack the modulus where the primes share their LSBs and there exists two public parameters and such that the corresponding decryption parameters and share their MSBs. They showed that if the RSA crytosystem satisfies those conditions, then it is possible to factor N provided where Thus, implementors need to ensure that their private key does not fall below than the bound that can be factorised by the third party.
Our contribution:
Extending the result from [16], this paper presents an attack on the modulus when the primes share a known amount of the LSBs while and share an amount of their MSBs. We formulate a lemma by ulitizing the information on the sharing LSBs between the primes. Then, we use the result from the lemma to build an integer multivariate polynomial. We apply the strategy of Jochemsz and May to find the small roots of our integer multivariate polynomial which leads to the factorization of the modulus N. We are able to increase the unsafe bound for the decryption exponent given by where
That is, we prove that if , then N can be factored. As such, we improved the bounds made by the previous attacks as shown in Table 1.
Table 1.
Bounds for d from the former attacks.
2. Materials and Methods
We start this section by introducing in brief on lattice, a theorem on lattice reduced basis, and two useful lemmas on approximation of size of primes in modulus. Then we provide our main lemma of primes sharing bits that has been reformulated from [16]. All of these definitons, theorem and lemmas will be used throughout this paper.
2.1. Lattices
Let be a set vectors that are linearly independent with . The lattice constructed by is the set of linear combinations of with dimension n provided the coefficients are positive integers such that
The dimension of this lattice is dim. The lattice is called full ranked lattice if . To find the determinant of this type of lattice, one may compute the absolute value of the determinant of the matrix whose rows consist of . Lenstra, Lenstra, and Lovasz in 1982 [17] invented the algorithm to find a short basis vector in time polynomial. Their theorem is stated as follows.
Theorem 1.
Let the lattice with dim be constructed by a basis . The algorithm outputs a reduced basis ,
for all .
In practice, the LLL algorithm has been broadly known to often produces the vectors that have much smaller norms than theoretically predicted. Hence, by utilizing this algorithm, Coppersmith in 1997 introduced a technique to find small roots for polynomial that is modular form. By applying the LLL algorithm, a number of linear equations with sufficiently small norms will be produced. Later, Howgrave-Graham [18] reformulated Coppersmith’s idea of finding the roots of modular polynomial and thus came out with the theorem as follows.
Theorem 2.
Let be a polynomial with ω monomials. Suppose that where for and . Then holds over integers.
Remark that our attack relies on Assumption 1 which was also being used in the previous proposed attacks such as [11,12,13].
Assumption 1.
The construction of LLL algorithm produces a few polynomials that are algebraically independent. The resultant technique can be used in order to compute the common roots of these polynomials.
Applying Coppersmith’s method, Jochemsz and May [19] introduced a strategy purposely to solve for the small roots of a polynomial. Interestingly, their strategy can be used on either modular or integer of multivariate polynomial. It was also easier to understand and implement. Thus, in our work, we used their strategy in order to find the roots of our polynomial.
2.2. Approximation of Size of Primes in Modulus
Asbullah and Ariffin [20] produced the following lemmas to show an approximation of . Lemma 1 describes the size of p and q for the modulus which then was utilized in Lemma 2 to approximate the size of . In our work, we use Lemma 2 to approximate the bound for one of the variables in our polynomial.
Lemma 1.
Suppose where p and q are balanced primes. Then
Lemma 2.
Suppose where p and q are balanced primes. Then
2.3. Prime Sharing LSBs on the Modulus
We present the lemma by [16]. The authors study the case where the modulus consists of the primes that share some known amount of LSBs.
Lemma 3.
Let be an RSA modulus where are balanced primes. Let for a known value of b. Then and where is the solution of the equation and with
Proof.
See [16]. □
2.4. Prime Sharing LSBs on the Modulus
This section presents the lemma that has been reformulated from the result [16]. It considers the case where the primes of the modulus share some known amount of their LSBs.
Lemma 4.
Let be modulus and suppose that for a known value of m. Let and where is a solution to . If then where
Proof.
See Appendix A. □
3. Our New Attack
In this section, we present the theorem of an attack on modulus which applies when the primes share a known amount of LSBs and there exists and that share an amount of MSBs.
Theorem 3.
Let be modulus such that where . Let be two public exponents that satisfy , and . Suppose that and . Then N can be factored if
Proof.
See Appendix B. □
4. Comparison with the Previous Attacks
We make a comparison of bounds with the previous analysis upon the modulus for . Their analysis focused on the RSA key equation where . Note that in these former attacks, they do not consider where the private exponent or the primes share an amount of LSBs or MSBs. Thus, in our comparison, we let , . We get the following corollary.
Corollary 1.
Let be modulus with balanced primes. Let satisfies , and . Let . Then N can be factored if
Table 2 shows that our bound improves the previous bounds. The value of increases impressively as the value of decreases. Note that the bounds from the former attacks only consider the value of r, thus the values of is fixed for all values of . Refer Table 1 in Section 1 to see the bounds from these former atttacks for .
Table 2.
Comparison with methods from [10,11,12] for and .
Remark 1.
We want to analyze the bound for γ that works for our attack. Observe that from the Corollary 1, after setting the value of and we obtain
Assume that . From key equation, we have
then
Now, the condition of Corollary 1 becomes
A straightforward calculation gives us the upper bound of the positive value γ which is . Hence, the method works for smaller value of γ. This translates into .
5. Conclusions
We present an attack on partial key exposure for modulus . Note that our attack is an extension from [16]. In our paper, we show that despite the advantages of using the modulus , the modulus is still vulnerable to the attack if the primes share some amount of LSBs and the private keys share some amount of MSBs. We reformulate the lemma from [16] and find the substitution for . We utilize the result in our lemma to prove our theorem that is based on the two key equations and . From our theorem, we show that one can factor N when for for . Thus, one needs to be careful in selecting their primes and decryption exponents as it may leads to the vulnerability of their cryptosystem and their secret data might leak to an unauthorized party. There are other schemes that one might be interested to apply in order to keep the data secure such as using covert channel [21] and double blockchain [22].
Author Contributions
Formal analysis, N.N.H.A., M.R.K.A., S.H.S., A.H.A.G. and M.A.A.; Funding acquisition, M.R.K.A.; Investigation, N.N.H.A.; Project administration, M.R.K.A.; Validation, S.H.S.; Writing–original draft, N.N.H.A.; Writing–review and editing, M.R.K.A., S.H.S., A.H.A.G. and M.A.A. All authors have read and agreed to the published version of the manuscript.
Funding
The research was supported by Ministry of Education of Malaysia with Fundamental Research Grant Scheme (FRGS/1/2019/STG06/UPM/02/8).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A
Proof of Lemma 4.
Let . Then and
Hence, from (A1), we obtain . Let be a solution of the modular equation . Then, is a solution which can be rewritten as where is a positive integer. Now we have,
where Utilizing would yield
From (A2), we deduce
Suppose gcd, we multiply (A3) with and get
which can be rewritten as
where . Finally we have,
where □
Appendix B
Proof of Theorem 3.
Let and satisfy
From Lemma 1, we show that can be substituted by where and is a solution of the congruence . Therefore
Plugging (A7) in (A6), we get
Rearranging (A8),
Now, we would have the polynomial
Then is a root of and can be found by using Coppersmith’s technique [4]. However, we choose apply the extended strategy of Jochemsz and May [19] due to its easier implementation. The following bound will be needed:
- max
- max
- with and .
- with
- -
- ,
- -
Let . Define two sets,
and
Using the binomial expansion formula, we find the expansion of polynomial .
Neglecting the coefficients, we get
Define
Then W satisfies
Next define
Suppose that is relatively prime with R. We define in order to work with a polynomial with constant term 1. Next, define the polynomials
The basis of a lattice is built by using the coefficients of polynomial G and H with dimension
In order to construct an upper triangular matrix, we perform the following ordering of the monomials: if then and the monomials are lexicographically ordered if . The diagonal entries of the matrix are of the form
Refer the Table A1 in Appendix C for the coeffficient matrix of and .
Next, we define
The determinant of is then
All the polynomials G and H and their combinations share the root modulo R. A new basis with short vectors is produced after applying the LLL algorithm to the lattice . For , let be four short vectors of the reduced basis. Each is a combination of G and H, and then share the root . Applying Theorem 1 from Section 2, we have for
We force the polynomials for , to comply with Howgrave-Graham’s bound [18]. The condition is suffice when
which can be transformed into det, that is
Substituting with and with , we get
Using (A12), we get
Similarly, we get
Set , then,
Using this, and after simplifying by , the inequation (A13) transform into
Differentiate the equation above with respect to , we get the optimal value , this reduces to
which is valid if
We find our reduced polynomial with the root of under this condition. By Assumption 1 in Section 2, the solution of the roots can be extracted using resultant technique. Then, using the fourth and fifth root, , we compute
After that, we use (A14) to find and since , we can get p by taking the gcd. This leads to factorization of N and hence terminates the proof. □
Appendix C
Remark A1.
Note that the values of A and B are as follows:
.
Table A1.
The coefficient matrix for the case and .
Table A1.
The coefficient matrix for the case and .
| 1 | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| A | ** | ** | ** | ** | ** | ** | ** | ||||||||||||||||||||||||||
| A | ** | ** | ** | ** | ** | ** | ** | ||||||||||||||||||||||||||
| A | ** | ** | ** | ** | ** | ** | ** | ||||||||||||||||||||||||||
| A | ** | ** | ** | ** | ** | ** | ** | ||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| A | ** | ** | ** | ** | ** | ** | ** | ||||||||||||||||||||||||||
| A | ** | ** | ** | ** | ** | ** | ** | ||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| A | ** | ** | ** | ** | ** | ** | ** | ||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B | |||||||||||||||||||||||||||||||||
| B |
** denotes the non-zero elements.
References
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Wiener, M.J. Cryptanalysis of short RSA secret exponents. J. IEEE T. Inform. Theory 1990, 36, 553–558. [Google Scholar] [CrossRef]
- Boneh, D.; Durfee, G. Cryptanalysis of RSA with private key d less than N0.292. J. IEEE Trans. Inform. Theory 2000, 46, 1339–1349. [Google Scholar] [CrossRef]
- Coppersmith, D. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptol. 1997, 10, 233–260. [Google Scholar] [CrossRef]
- Hinek, M.J. Multi-Prime RSA. In Cryptanalysis of RSA and Its Variants; CRC: London, UK; New York, NY, USA, 2010; p. 155. [Google Scholar]
- Takagi, T. A fast RSA-type public-key primitive modulo pkq using Hensel lifting. IEICE Trans. 2004, 87, 94–101. [Google Scholar]
- Ariffin, M.R.K.; Asbullah, M.A.; Abu, N.A.; Mahad, Z. A new efficient asymmetric ccryptosystem based on the integer factorization problem of N=p2q. MJMS 2013, 10, 19–37. [Google Scholar]
- Asbullah, M.A.; Ariffin, M.R.K. Design of Rabin-like cryptosystem without decryption failure. MJMS 2016, 10, 1–18. [Google Scholar]
- Boneh, D.; Durfee, G.; Howgrave-Graham, N. Factor N=prq for large r. In Cryptographers’ Track at the RSA Conference; Springer: Cham, Switzerland, 1999; pp. 326–337. [Google Scholar]
- May, A. A secret exponent attacks on RSA-typer schemes with moduli N=prq. In International Workshop on Public Key Cryptography; Springer: Berlin/Heidelberg, Germany, 2004; pp. 218–230. [Google Scholar]
- Sarkar, S. Small secret exponent attack on RSA varian with modulus N=prq. Des. Codes Cryptogr. 2014, 73, 383–392. [Google Scholar] [CrossRef]
- Lu, Y.; Zhang, R.; Peng, L.; Lin, D. Solving linear equations modulo unknown divisors: Revisited. In International Conference on the Theory and Application of Cryptology and Information Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 189–213. [Google Scholar]
- Boneh, D.; Durfee, G.; Frankel, Y. An attack on RSA given a small fraction of the private key bits. In International Conference on the Theory and Application of Cryptology and Information Security; Springer: Berlin/Heidelberg, Germany, 1998; pp. 25–34. [Google Scholar]
- Sun, H.M.; Wu, M.E.; Steinfeld, R.; Guo, J.; Wang, H. Cryptanalysis of short exponent RSA with primes sharing least significant bits. In International Conference on Cryptology and Network Security; Springer: Berlin/Heidelberg, Germany, 2008; pp. 49–63. [Google Scholar]
- Zhao, Y.D.; Qi, W.F. Small private-exponent attack on RSA with primes sharing bits. In International Conference on Information Security; Springer: Berlin/Heidelberg, Germany, 2007; pp. 221–229. [Google Scholar]
- Nitaj, A.; Ariffin, M.R.K.; Nassr, D.I.; Bahig, H.M. New attacks on the RSA cryptosystem. In International Conference on Cryptology in Africa; Springer: Cham, Switzerland, 2014; pp. 178–198. [Google Scholar]
- Lenstra, A.K.; Lenstra, H.W.; Lovasz, H.W. Factoring polynomials with rational coeffcients. J. Math. Ann. 1982, 261, 515–534. [Google Scholar] [CrossRef]
- Howgrave-Graham, N. Finding small roots of univariate modular equations revisited. In MA International Conference on Cryptography and Coding; Springer: Berlin/Heidelberg, Germany, 1997; pp. 131–142. [Google Scholar]
- Jochemsz, E.; May, A. A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. In International Conference on the Theory and Application of Cryptology and Information Security; Springer: Berlin/Heidelberg, Germany, 2006; pp. 267–282. [Google Scholar]
- Asbullah, M.A.; Ariffin, M.R.K. New attacks on RSA with modulus N=p2q using continued fractions. J. Phys. Conf. Ser. 2015, 622, 191–199. [Google Scholar] [CrossRef]
- Zhang, L.; Huang, T.; Hu, X.; Zhang, Z.; Wang, W.; Guan, D.; Zhoa, C.; Kim, S. A distributed covert channel of the packet ordering enhancement model based on data compression. Comput. Mater. Contin. 2020, 64, 2013–2030. [Google Scholar]
- Zhang, L.; Peng, M.; Wang, W.; Cui, S.; Kim, S. Secure and efficient data storage and sharing scheme based on double blockchain. Comput. Mater. Contin. 2021, 66, 499–515. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).