# New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method

^{1}

Al-Kindi Cryptography Research Laboratory, Institute for Mathematical Research, Universiti Putra Malaysia, Selangor 43400, Malaysia

^{2}

Department of Mathematics, Faculty of Science, Universiti Putra Malaysia, Selangor 43400, Malaysia

^{3}

Centre of Foundation Studies for Agriculture Science, Universiti Putra Malaysia, Selangor 43400, Malaysia

^{*}

Author to whom correspondence should be addressed.

^{†}

These authors contributed equally to this work.

Received: 1 November 2018 / Revised: 14 December 2018 / Accepted: 15 December 2018 / Published: 20 December 2018

# Abstract

This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus*Keywords:*RSA modulus; primes difference; cryptanalysis; short decryption exponent; attacks; continued fraction

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

# Share & Cite This Article

**MDPI and ACS Style**

Kamel Ariffin, M.R.; Abubakar, S.I.; Yunos, F.; Asbullah, M.A. New Cryptanalytic Attack on RSA Modulus *N* = *pq* Using Small Prime Difference Method. *Cryptography* **2019**, *3*, 2.

*Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here*.

# Article Metrics

# Comments

[Return to top]*Cryptography*EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert