 Previous Article in Journal
Further Observations on SIMON and SPECK Block Cipher Families

Article

# New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method

1
Al-Kindi Cryptography Research Laboratory, Institute for Mathematical Research, Universiti Putra Malaysia, Selangor 43400, Malaysia
2
Department of Mathematics, Faculty of Science, Universiti Putra Malaysia, Selangor 43400, Malaysia
3
Centre of Foundation Studies for Agriculture Science, Universiti Putra Malaysia, Selangor 43400, Malaysia
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Cryptography 2019, 3(1), 2; https://doi.org/10.3390/cryptography3010002
Received: 1 November 2018 / Revised: 14 December 2018 / Accepted: 15 December 2018 / Published: 20 December 2018
This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus $N = p q$ in polynomial time. The paper has two parts. In the first part, we report the usage of the small prime difference method of the form $| b 2 p − a 2 q | < N γ$ where the ratio of $q p$ is close to $b 2 a 2$ , which yields a bound $d < 3 2 N 3 4 − γ$ from the convergents of the continued fraction expansion of $e N − ⌈ a 2 + b 2 a b N ⌉ + 1$ . The second part of the paper reports four cryptanalytic attacks on t instances of RSA moduli $N s = p s q s$ for $s = 1 , 2 , … , t$ where we use $N − ⌈ a 2 + b 2 a b N ⌉ + 1$ as an approximation of $ϕ ( N )$ satisfying generalized key equations of the shape $e s d − k s ϕ ( N s ) = 1$ , $e s d s − k ϕ ( N s ) = 1$ , $e s d − k s ϕ ( N s ) = z s$ , and $e s d s − k ϕ ( N s ) = z s$ for unknown positive integers $d , k s , d s , k s$ , and $z s$ , where we establish that t RSA moduli can be simultaneously factored in polynomial time using combinations of simultaneous Diophantine approximations and lattice basis reduction methods. In all the reported attacks, we have found an improved short secret exponent bound, which is considered to be better than some bounds as reported in the literature. View Full-Text
MDPI and ACS Style

Kamel Ariffin, M.R.; Abubakar, S.I.; Yunos, F.; Asbullah, M.A. New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method. Cryptography 2019, 3, 2. https://doi.org/10.3390/cryptography3010002

AMA Style

Kamel Ariffin MR, Abubakar SI, Yunos F, Asbullah MA. New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method. Cryptography. 2019; 3(1):2. https://doi.org/10.3390/cryptography3010002

Chicago/Turabian Style

Kamel Ariffin, Muhammad Rezal, Saidu Isah Abubakar, Faridah Yunos, and Muhammad Asyraf Asbullah. 2019. "New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method" Cryptography 3, no. 1: 2. https://doi.org/10.3390/cryptography3010002

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

1