Next Article in Journal
Combined and General Methodologies of Key Space Partition for the Cryptanalysis of Block Ciphers
Previous Article in Journal
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Partial Exposure Attacks on a New RSA Variant

1
ACSA Laboratory, Department of Mathematics and Computer Science, Sciences Faculty, Mohammed First University, Oujda 60000, Morocco
2
LMNO, CNRS, UNICAEN, Caen Normandie University, 14000 Caen, France
*
Author to whom correspondence should be addressed.
Cryptography 2024, 8(4), 44; https://doi.org/10.3390/cryptography8040044
Submission received: 26 August 2024 / Revised: 19 September 2024 / Accepted: 2 October 2024 / Published: 6 October 2024

Abstract

:
In 2022, Cotan and Teşeleanu presented a variant of the RSA cryptosystem where the modulus is of the form N = p q , and the private and the public exponents satisfy e d 1 ( mod ψ n ( N ) ) with n 2 , and ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) . This variant of RSA was recently cryptanalyzed by Nitaj, Adenan, and Ariffin at Africacrypt 2024. In this paper, we push further the cryptanalysis of the scheme of Cotan and Teşeleanu by presenting a method to solve the equation x H ( y ) + c 0 ( mod e ) where c is a constant that is independent of x and y. This enables us to propose more attacks on the scheme, including a partial key exposure attack, an attack when the most significant bits of one of the prime factors are known, and an attack when the least significant bits of one of the prime factors are known.

1. Introduction

Invented in 1978 by Rivest, Shamir, and Adleman [1], the RSA cryptosystem is one of the most used public key cryptosytems regarding its practical applications. Its security is related to the hardness of factoring composite large integers. To use the RSA scheme, one starts by generating two large prime numbers p and q of the same bit size, and it computes N = p q as the RSA modulus. Then, one selects an integer e, called the public exponent, satisfying gcd e , p 1 ) ( q 1 ) = 1 . This enables us to compute the private exponent d as the inverse of e modulo ( p 1 ) ( q 1 ) , that is e d 1 ( mod ( p 1 ) ( q 1 ) ) . The encryption process allows transforming a plaintext m < N to a ciphertext c m e ( mod N ) . To recover the plaintext m, one applies the decryption process m c d ( mod N ) . The efficiency of both encryption and decryption is based on the run time of the modular exponentiation. To reduce the run time, specifically in the decryption, it is tempting to use small private exponents. Unfortunately, in 1990, Wiener [2] showed that such a choice is vulnerable when d 1 3 N 1 4 . The former bound was improved later by Boneh and Durfee [3] up to N 0.292 .
Based on these obstacles, several variants have been proposed to improve the efficiency as well as the security of RSA. Some of these variants employ a modulus of the form N = p q as in CRT-RSA [4], rebalanced RSA [2], and KMOV [5]. In contrast, other variants utilize different types of moduli, such as Multi-Prime RSA [6] and Prime-Power RSA [7].
In 2018, Murru and Saettone [8] introduced a new variant of the RSA scheme based on the cubic Pell equation x 3 + a y 3 + a 2 z 3 3 a x y z = 1 , where a is a cubic non-residue modulo N = p q . They used N = p q as a modulus, with the public key being ( N , e ) and the private key ( N , d ) , where e and d satisfy e d 1 mod ( p 3 1 ) ( q 3 1 ) ( p 1 ) ( q 1 ) . This variant of RSA has been intensively cryptanalyzed in [9,10,11,12].
In 2022, Cotan and Teşeleanu [13] proposed a generalization of the scheme of Murru and Saettone. They used a modulus N = p q , a public exponent e, and a private exponent d such that e d 1 mod ( p n 1 ) ( q n 1 ) ( p 1 ) ( q 1 ) for n 2 . The special case n = 3 is the scheme of Murru and Saettone. The authors also presented an attack based on the continued fraction algorithm whenever n 4 , d = N δ , e = N α , α n 1 2 , and δ < 1 4 ( 2 n 2 α 1 ) .
In 2024, Nitaj et al. [14] developed a novel attack on the Cotan and Teşeleanu scheme using Coppersmith’s method and lattice basis reduction. They demonstrated that one can efficiently factor the modulus N = p q if e = N α , d N δ , n 1 2 α 2 ( n 1 ) , and δ < n 1 2 2 ( n 1 ) α .
In the work of Nitaj et al. [14], the authors started by solving the modular equation x H ( y ) + c 0 ( mod e ) where H ( y ) is a monic polynomial of degree r, under certain conditions, namely, e = N α , | x | < N β , | y | < N γ , c < | x | | y | r < e , and β < α r α γ . As a by-product, they presented an attack on the scheme of Cotan and Teşeleanu and showed that N = p q can be factored for any n 2 if e and d satisfy e d 1 mod ( p n 1 ) ( q n 1 ) ( p 1 ) ( q 1 ) and δ < n 1 2 2 ( n 1 ) α . This significantly improved the bound δ < 1 4 ( 2 n 2 α 1 ) of Cotan and Teşeleanu.
In this paper, for a monic univariate polynomial H ( y ) Z [ y ] of degree r, we propose a new lattice-based method to solve the equation x H ( y ) + c 0 ( mod e ) when N = p q , e = N α , | x | N β , | y | N γ , | x | | y | r < e , and β < α + 1 3 r γ 2 3 3 r α γ + r 2 γ 2 . This can be achieved for any value of c; in particular, the condition | c | < x y r is no more required. This allows us to perform four attacks on the scheme of Cotan and Teşeleanu. The first attack deals with the situation where the least significant bits (LSBs) of the private exponent d are known. The second attack concerns the situation where an approximation of one of the primes is known. The third attack concerns the situation when the primes share their most significant bits (MSBs). The fourth attack concerns the situation where the primes share their least significant bits.
The paper is organized as follows. In Section 2, we present some preliminaries and provide a new expression for ψ n ( N ) that is useful in the sequel. In Section 3, we present the new method to find the small solutions of the equation x H ( y ) + c 0 ( mod e ) . In Section 4, we apply the proposed method to perform the first attack on the cryptosystem of Cotan and Teşeleanu, namely, an attack with known LSBs. In Section 5, we present the second attack, which is a partial prime exposure attack. In Section 6, we apply the third attack when the prime factors of the modulus share their MSBs. In Section 7, we present another expression for ψ n which allows performing the fourth attack when the prime factors of the modulus share their LSBs. Finally, we conclude the paper in Section 8.

2. Preliminaries

Let N = p q be an RSA modulus with q < p < 2 q . Then, p and q can be bounded in terms of N as in the following simple lemma.
Lemma 1.
Let N = p q be an RSA modulus with q < p < 2 q . Then,
2 2 N < q < N < p < 2 N .
The following lemma shows how to find an approximation of q if an approximation of p is given (see [9]).
Lemma 2.
Let N = p q be an RSA modulus with q < p < 2 q . Let p 0 be an approximation of p such that | p     p 0 | = N μ . Then, q 0 = N p 0 is an approximation of q such that
| q     q 0 | < N μ a n d | p + q p 0 q 0 | < 2 N μ .
The generalized totient function in the system of Cotan and Teşeleanu [13] is defined for N = p q and n 2 by
ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) .
The following result gives simple upper and lower bounds for ψ n ( N ) .
Lemma 3.
Let N = p q , n 2 , and ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) . Then
N n 1 < ψ n ( N ) < 4 N n 1 .
Proof. 
For the lower bound, we have
ψ n ( N ) = p n 1 + p n 2 + 1 q n 1 + q n 2 + + 1 > p n 1 q n 1 = N n 1 .
For the upper bound, using x n 1 + x n 2 + + 1 < 2 x n 1 for x > 2 , we obtain
ψ n ( N ) = p n 1 + p n 2 + 1 q n 1 + q n 2 + + 1 < 4 p n 1 q n 1 = 4 N n 1 .
This terminates the proof. □
The following result shows how to compute ψ n ( N ) (see [14]).
Lemma 4.
Let N = p q and S = p + q . Then, ψ 1 ( N ) = 1 , ψ 2 ( N ) = N + 1 + S , and for n 3 ,
ψ n ( N ) = N n 1 + 1 + S ψ n 1 ( N ) N ψ n 2 ( N ) .
The following result shows that ψ n ( N ) can be expressed as a polynomial of p + q (see [14]).
Lemma 5.
Let N = p q and n 2 . Then, there exist n 1 integer coefficients a n 2 , , a 0 depending only on N and n such that
ψ n ( N ) = ( p + q ) n 1 + j = 0 n 2 a j ( p + q ) j .
Note that in Lemma 5, the coefficients a i can be computed only by using N and n. Nevertheless, ψ n ( N ) cannot be computed by an adversary who does not know p + q .
The former result can be extended in the following form.
Lemma 6.
Let N = p q , n 2 , ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) , and M Z . Then, there exist n 1 coefficients a j ( n ) Z , j = 0 , , n 2 , depending only on N, n, and M such that
ψ n ( N ) = ( p + q M ) n 1 + j = 0 n 2 a j ( n ) ( p + q M ) j .
Proof. 
We proceed by recursion. We have ψ 1 ( N ) = 1 , and
ψ 2 ( N ) = ( p + 1 ) ( q + 1 ) = ( p + q M ) + N + M + 1 , ψ 3 ( N ) = ( p 2 + p + 1 ) ( q 2 + q + 1 ) = ( p + q M ) 2 + ( N + 2 M + 1 ) ( p + q M ) + M ( N + M + 1 ) + N 2 N + 1 .
Assume that, for n 4 , we have
ψ n 2 ( N ) = ( p + q M ) n 3 + j = 0 n 4 a j ( n 2 ) ( p + q M ) j , a j ( n 2 ) Z , ψ n 1 ( N ) = ( p + q M ) n 2 + j = 0 n 3 a j ( n 1 ) ( p + q M ) j , a j ( n 1 ) Z .
Using Lemma 4, we obtain
ψ n ( N ) = ( p + q ) ψ n 1 ( N ) N ψ n 2 ( N ) + N n 1 + 1 = ( p + q M ) ψ n 1 ( N ) + M ψ n 1 ( N ) N ψ n 2 ( N ) + N n 1 + 1 = ( p + q M ) n 1 + a n 3 ( n 1 ) + M ( p + q M ) n 2 + a n 4 ( n 1 ) + M a n 3 ( n 1 ) N ( p + q M ) n 3 + j = 1 n 4 a j 1 ( n 1 ) + M a j ( n 1 ) N a j ( n 2 ) ( p + q M ) j + M a 0 ( n 1 ) N a 0 ( n 2 ) + N n 1 + 1 = ( p + q M ) n 1 + j = 0 n 2 a j ( n ) ( p + q M ) j ,
where
a n 2 ( n ) = a n 3 ( n 1 ) + M , a n 3 ( n ) = a n 4 ( n 1 ) + M a n 3 ( n 1 ) N , a j ( n ) = a j 1 ( n 1 ) + M a j ( n 1 ) N a j ( n 2 ) , j = 1 , , n 4 , a 0 ( n ) = M a 0 ( n 1 ) N a 0 ( n 2 ) + N n 1 + 1 .
This shows that all the coefficients a j ( n ) , 0 j n 2 are integers and depend only on N, n, and M. This terminates the proof. □
Using Lemma 4, one can express the first values of ψ n ( N ) as a polynomial in T = p + q M . For instance, we have
ψ 1 ( N ) = 1 , ψ 2 ( N ) = T + M + N + 1 , ψ 3 ( N ) = T 2 + ( 2 M + N + 1 ) T + M ( M + N + 1 ) + N 2 N + 1 , ψ 4 ( N ) = T 3 + ( 3 M + N + 1 ) T 2 + M ( 3 M + 2 N + 2 ) + N 2 2 N + 1 T + M 2 + M 3 + M + M ( N 2 + M N 2 N ) + N 3 N 2 N + 1 , ψ 5 ( N ) = T 4 + ( 4 M + N + 1 ) T 3 + M ( 6 M + 3 N + 3 ) + N 2 3 N + 1 T 2 + 4 M 3 + 3 M 2 + 2 M + M ( 3 M N + 2 N 2 6 N ) + N 3 2 N 2 2 N + 1 T + M 4 + M 3 + M 2 + M + M ( M 2 N + M N 2 3 M N + N 3 2 N 2 2 N ) + N 4 N 3 + N 2 N + 1 .

2.1. Lattice Basis Reduction and Coppersmith’s Method

Let ω and n be positive integers with ω n . Let v 1 , v 2 , , v ω be ω linearly independent vectors of R n . A lattice L R n is the set of all integer linear combinations of v 1 , v 2 , , v ω , that is,
L = Z v 1 + Z v 2 + + Z v ω .
The lattice L can be represented by a matrix B whose rows are the vectors v 1 , v 2 , , v ω . The parameter n is the dimension of the lattice L , and ω is its rank. Its determinant is defined to be det ( L ) = det B t B where B t is the transpose of B. When ω = n , we say that the lattice L is full-rank, and then its determinant is simplified to det ( L ) = | det B | .
It is known that a lattice L has infinitely many bases, and finding a basis with short vectors is a hard task especially when the dimension of the lattice is large. In 1982, Lenstra, Lenstra and Lovász [15] proposed LLL, which is a polynomial time algorithm to find a short basis. The following result [16] is widely used to estimate the output of the LLL algorithm.
Theorem 1.
Let L be a lattice spanned by a basis ( v 1 , v 2 , , v ω ) . The LLL algorithm produces a reduced basis ( u 1 , u 2 , , u ω ) satisfying
u 1     u i   2 ω ( ω 1 ) 4 ( ω + 1 i ) det ( L ) 1 ω + 1 i , for i = 1 , , ω .

2.2. Coppersmith’s Method

In 1996, Coppersmith [17] proposed an efficient way to find small roots of modular polynomial equations of the form f ( x ) 0 ( mod M ) , mainly when the factorization of the modulus M is unknown. Since then, Coppersmith’s method has been generalized to polynomials with more variables, specifically polynomials of the form
f ( x 1 , x 2 , , x n ) = i 1 , i 2 , , i n a i 1 , i 2 , , i n x 1 i 1 x 2 i 2 x n i n ,
with a i 1 , i 2 , , i n Z . For such polynomials, the Euclidean norm is defined by f ( x 1 , x 2 , , x n )   = a i 1 , i 2 , , i n 2 .
In 1997, Howgrave-Graham [18] clarified Coppersmith’s method in the following sense.
Theorem 2
(Howgrave-Graham). Let f ( x 1 , x 2 , , x n ) Z [ x 1 , x 2 , , x n ] be a multivariate polynomial with at most ω monomials. Let e and m be positive integers. Suppose that
1. 
f ( y 1 , y 2 , , y n ) 0 ( mod e m ) .
2. 
f ( x 1 X 1 , x 2 X 2 , , x n X n )   < e m ω , | y i |   < X i , for i = 1 , , n .
Then, f ( y 1 , y 2 , , y n ) = 0 holds over the integers.
When more than two variables are involved, the methods based on Coppersmith’s technique are heuristic. In this paper, we use the following assumption [3,12,19,20]. This is a reasonable assumption that holds true when the parameters are sufficiently smaller than the theoretical bounds.
Assumption 1.
The reduced polynomials h 1 , h 2 , , h ω generated by the LLL algorithm are algebraically independent.
Under the former assumption, the common root ( y 1 , y 2 , , y n ) of the polynomial equations h i ( y 1 , y 2 , , y n ) = 0 , i = 1 , , ω can be extracted by the Gröbner basis method or resultant techniques.

2.3. The Scheme of Cotan and Teşeleanu

Before describing the scheme, we need to define some mathematical objects that are useful in the sequel. Let ( F , + , · ) be a field. Let n be an integer and a F such that x n a is irreducible in F [ x ] . Define the quotient field
A n = F [ x ] / ( x n a ) = { a 0 + a 1 x + + a n 1 x n 1 a 0 , , a n 1 F } .
The product of two elements a ( x ) = i = 0 n 1 a i x i and b ( x ) = i = 0 n 1 b i x i of A n can be computed by the rule
a ( x ) b ( x ) = i = 0 n 2 j = 0 i a j b i j + a j = 0 i + n a j b i j + n x i + j = 0 n 1 a j b n 1 j x n 1 .
Consider the quotient group B n = A n / F ; then, elements of B n are equivalence classes of the form
[ a 0 + + a n 1 x n 1 ] = γ a 0 + + γ a n 1 x n 1 γ F , a 0 , , a n 1 F .
Note that B n = k = 0 n 1 B k , where
B k = { a 0 + + a k 1 x k 1 + x k a 0 , , a k 1 F } , k = 0 , , n 1 ,
and B i B j = whenever i j .
When p is a prime number and F = F p is the finite field of p elements, A n becomes the Galois field of order p n . Also, B n is a cyclic group of order
k = 0 n 1 | F p | k = p n 1 p 1 .
If m is a positive integer and y B n , denote by y m the product of y in B n , m 1 times. Hence, an analogous of Fermat’s little theorem is given by
[ a ( x ) ] | B n | 1 ( mod   p ) , [ a ( x ) ] B n .
Observe that if N = p q is the product of two prime numbers, and F = Z / N Z , we obtain
| B n |   = ( p n 1 ) ( q n 1 ) ( p 1 ) ( q 1 ) .
Furthermore, for every [ a ( x ) ] B n , we also have
[ a ( x ) ] | B n | 1 ( mod N ) .
The scheme of Cotan and Teşeleanu can be summarized as follows.

Key Generation

1.
Select a positive integer n > 1 and a security size λ > 0 .
2.
Generate randomly two distinct large prime numbers of size λ .
3.
Calculate N = p q and ψ n ( N ) = ( p n 1 ) ( q n 1 ) ( p 1 ) ( q 1 ) .
4.
Choose an integer a for which x n a is irreducible in Z / p Z [ x ] , Z / q Z [ x ] , and Z / N Z [ x ] .
5.
Select an integer e such that gcd ( e , ψ n ( N ) ) = 1 and compute d, the inverse of e modulo ψ n ( N ) .
6.
The public key is ( N , n , a , e ) and the private key is ( p , q , d ) .

Encryption

1.
Represent the plaintext as a polynomial
m ( x ) = m 0 + m 1 x + + m n 2 x n 2 + x n 1 B n .
2.
Compute c ( x ) [ m ( x ) ] e ( mod   N ) .
3.
The ciphertext is c ( x ) .

Decryption

To recover the plaintext m ( x ) , one needs to compute
m ( x ) [ c ( x ) ] d ( mod   N ) .

3. Solving the Equation xH ( y ) + c 0 ( mod   e )

In this section, we propose a new technique to find the small solutions of the modular equation x H ( y ) + c 0 ( mod e ) where c is a constant, and H ( y ) Z [ y ] is a monic polynomial of degree r. The equation x H ( y ) + c 0 ( mod e ) was previously studied by Kunihiro [21] and recently by Nitaj et al. [14]. In both works, the value x y r is replaced by z c , and the assumption | c | < | x | | y | r is used. In this paper, we present a different method where x y r is independent of c. This relaxes the condition | c | < | x | | y | r used in [14,21], and it permits more applications in the cryptanalysis of some variants of RSA.

3.1. The New Method

Theorem 3.
Let N = p q be an RSA modulus with q < p < 2 q . Let H ( y ) Z [ y ] be a monic polynomial of degree r 1 . If x H ( y ) + c 0 ( mod e ) with e = N α , | x | N β , | y | N γ , | x | | y | r < e , and
β < α + 1 3 r γ 2 3 3 r α γ + r 2 γ 2 ,
then one can find x and y in polynomial time.
Proof. 
Let f ( x , y ) = x H ( y ) + c with H ( y ) = y r + a r 1 y r 1 + + a 0 Z [ y ] . We use Coppersmith’s technique [17] and the strategy of Jochemsz and May [19] to find the small solutions of the equation f ( x , y ) 0 ( mod e ) . Let m be a positive integer and t be a positive value. For 0 k m , consider the set
M k = 0 j t { x i y j + j | x i y j is a monomial of f m ( x , y )   and x i y j x y r k is a monomial of f m k ( x , y ) } .
A direct computation shows that the monomials x i y j of f m ( x , y ) are composed by the couples ( i , j ) with
i = 0 , , m , j = 0 , , r i .
Also, the monomials x i y j of f m k ( x , y ) are composed by ( i , j ) with
i = 0 , , m k , j = 0 , , r i .
This implies that the monomials x i y j of M k are composed by ( i , j ) with
i k = 0 , , m k , j r k = 0 , , r ( i k ) + t ,
or equivalently
i = k , , m , j = r k , , r i + t
In the strategy of Jochemsz and May [19], we need to form the set M k M k + 1 . Since M k + 1 is composed by the monomials x i y j with
i = k + 1 , , m , j = r k + r , , r i + t ,
then M k M k + 1 is the set of the monomials x i y j composed by
i = k + 1 , , m , j = r k , r k + 1 , , r k + r 1 , i = k , j = r k , , r k + t .
As in the strategy of Jochemsz and May, consider the list of polynomials
g k , i , j ( x , y ) = x i y j ( x y r ) k f ( x , y ) k e m k , x i y j M k M k + 1 .
These polynomials reduce to
g k , i , j ( x , y ) = x i y j f ( x , y ) k e m k , i = 1 , , m k , j = 0 , r 1 , i = 0 , j = 0 , , t .
Using f ( x , y ) = x H ( y ) + c = x y r + x a r 1 y r 1 + + a 0 + c , we set x y r = z , and F ( x , y , z ) = z + x a r 1 y r 1 + + a 0 + c . Then, the polynomials g k , i , j ( x , y ) can be transformed into the following ones,
G k , i , j ( x , y , z ) = x i y j F ( x , y , z ) k e m k , k = 0 , , m , i = 1 , , m k , j = 0 , , r 1 , k = 0 , , m , i = 0 , j = 0 , , t ,
where each term x y r is replaced by z.
Let ( x 0 , y 0 ) be a solution of the equation f ( x , y ) 0 ( mod e ) , and z 0 = x 0 y 0 r . Then, ( x 0 , y 0 , z 0 ) is a solution of the equation F ( x , y , z ) 0 ( mod e ) , and the polynomials G k , i , j ( x , y , z ) satisfy G k , i , j ( x 0 , y 0 , z 0 ) 0 ( mod e m ) .
Define the bounds
X = N β , Y = N γ , Z = N β + r γ ,
and assume that the solution ( x 0 , y 0 , z 0 ) satisfies | x 0 |   X , | y 0 |   Y , | z 0 |   Z . Following Coppersmith’s method, we use the coefficient vectors of the polynomials G k , i , j ( X x , Y y , Z z ) to form a matrix which is used as the basis matrix of a lattice L . In this matrix, the rows are ordered so that G k , i , j ( X x , Y y , Z z ) G k , i , j ( X x , Y y , Z z ) if k < k , or if k = k and i < i , or if k = k , i = i , and j < j . Similarly, the monomials are ordered so that z k x i y j z k x i y j if k < k , or if k = k and i < i , or if k = k , i = i , and j < j . In Table 1, we present an example of the matrix of the lattice for m = 2 , t = 1 where the symbols ★ are non-zero entries.
By construction, the matrix of the lattice is triangular, and its determinant is the product of the diagonal terms
det ( L ) = X n X Y n Y Z n Z e n e .
To compute the former exponents, consider the function
S ( v ) = k = 0 m i = 1 m k j = 0 r 1 v + k = 0 m i = 0 0 j = 0 t v .
Set t = m τ for τ 0 . To ease the computations, we take m τ m τ . The dominant parts of the exponents n X , n Y , n Z , n e as well as of the dimension ω of the lattice satisfy
n X = S ( i ) = 1 6 r m 3 + o ( m 3 ) n Y = S ( j ) = 1 2 τ 2 m 3 + o ( m 3 ) n Z = S ( k ) = 1 6 ( 3 τ + r ) m 3 + o ( m 3 ) n e = S ( m k ) = 1 6 ( 3 τ + 2 r ) m 3 + o ( m 3 ) ω = S ( 1 ) = 1 2 ( 2 τ + r ) m 2 + o ( m 2 ) .
After applying the LLL algorithm to the matrix of the lattice L , we obtain a reduced matrix from which we can extract ω new polynomials h k , i , j ( x , y , z ) . To combine Theorems 1 and 2 with i = 3 , we set
2 ω ( ω 1 ) 4 ( ω 2 ) det ( L ) 1 ω 2 < e m ω .
Using (1), this reduces to
e n e m ( ω 2 ) X n X Y n Y Z n Z < 2 ω ( ω 1 ) 4 ω ω 2 .
Using the dominant parts (2) with X = N β , Y = N γ , Z = N β + r γ , and e = N α , we obtain, after neglecting some small terms
1 6 ( 3 τ + 2 r ) 1 2 ( 2 τ + r ) α + 1 6 r β + 1 2 γ τ 2 + 1 6 ( 3 τ + r ) ( β + r γ ) < 0 .
Rearranging, we obtain
3 γ τ 2 + 3 ( r γ α + β ) τ + r 2 γ r α + 2 r β < 0 ,
in which the optimal value for τ is τ 0 = α β r γ 2 γ . Since e > | x | | y | r , then α > β + r γ , and τ 0 > 0 . Then, plugging τ 0 in (4), we obtain
3 β 2 + ( 6 α + 2 r γ ) β 3 α 2 + 2 r γ α + r 2 γ 2 < 0 ,
which leads to
β < α + 1 3 r γ 2 3 3 r α γ + r 2 γ 2 .
We notice that the former bound is positive since α > β + r γ . Under this bound, using three reduced polynomials h 1 ( x , y , z ) , h 2 ( x , y , z ) , h 3 ( x , y , z ) , we can extract the solution ( x 0 , y 0 , z 0 ) by the Gröbner basis method or resultant computations. This terminates the proof. □

3.2. A Numerical Example

In this section, we present a small numerical example to show the details of the resolution method of Theorem 3 with n = 4 , and r = n 1 = 3 . Consider the following parameters
N = 463028995904606051817018641173 , c = 895087879645377698399589802186741096954354552299285 87492654228177046463498977617360027022 , e = 172459409963116822030248732348419638390904926885797 13115090719406582906246851863033916922 .
Then, e = N α with α 2.97437 , and p + q < 3 N , so that y < 3 N γ with γ = 1 2 . Set β = 1 2 . Then, the conditions of Theorem 3 are satisfied since α > β + r γ = 2 , and β < α + 1 3 r γ 2 3 3 r α γ + r 2 γ 2 0.838 . The goal is to find a small solution ( x 0 , y 0 ) of the equation x H ( y ) + c 0 ( mod e ) where H ( y ) is derived from
ψ 4 ( N ) = ( p + q ) 3 + ( N + 1 ) ( p + q ) 2 + N 2 2 N + 1 ( p + q ) + N 3 N 2 N + 1 ,
with p + q = y , that is
H ( y ) = y 3 + ( N + 1 ) y 2 + N 2 2 N + 1 y + N 3 N 2 N + 1 .
Consider the bounds | x 0 |   X , | y 0 |   Y , and | x 0 y 0 3 |   Z with
X = N 0.5 = 680462339813605 , Y = 3 N 0.5 = 2041387019440815 , Z = X Y 3 = 578868797830754738565836771991739782740725532698185 4011616875 .
Let m = 4 , t = 2 , and
F ( x , y , z ) = z + x ( N + 1 ) y 2 + N 2 2 N + 1 y + N 3 N 2 N + 1 + c .
The lattice L is constructed with the coefficients of the polynomials defined by
G k , i , j ( x , y , z ) = x i y j F ( x , y , z ) k e m k , k = 0 , , m , i = 1 , , m k , j = 0 , , r 1 , k = 0 , , m , i = 0 , j = 0 , , t ,
where each term x y r is replaced by z. The dimension of the lattice is ω = 45 . After reducing the lattice with the LLL algorithm, and solving a system formed by three polynomial equations over the integers with the Gröbner basis method, we find the solution
x 0 = 16165734257585 , y 0 = 1360935721901674 , z 0 = 40748185648950035910680304028872647558518309799826755032040 .
Using p + q = y 0 and p q = N , we obtain
p = 683209007134751 , q = 677726714766923 ,
and the factorization of N is complete. Notice that c x 0 y 0 3 > 10 30 , and c is much larger than x 0 y 0 3 . This shows that the methods described in [14,21] cannot be applied to solve the equation x H ( y ) + c 0 ( mod e ) .

4. Partial Key Attack on the Scheme of Cotan and Teşeleanu with Known LSBs

In this section, we apply Theorem 3 to attack the scheme of Cotan and Teşeleanu when the attacker knows the s least significant bits (LSBs) of d so that d = d 1 M + d 0 for M = 2 s , with known d 0 , and unknown d 1 .
Theorem 4.
Let n 2 , and N = p q be the product of two unknown prime factors with q < p < 2 q . Let e = N α , and d N δ such that e d 1 ( mod ψ n ( N ) ) with ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) . Let M and d 0 be two known integers such that d = d 1 M + d 0 with M = N μ . Then, one can factor N in polynomial time if
δ < μ + 7 6 ( n 1 ) 1 3 6 ( n 1 ) ( α + μ ) + ( n 1 ) 2 .
Proof. 
In the equation e d k ψ n ( N ) = 1 , assume that d = d 1 M + d 0 where M and d 0 are known, and d 1 is unknown. We assume the following bounds
e = N α , M = N μ , d N δ .
We rewrite the equation e d k ψ n ( N ) = 1 as
k ψ n ( N ) e d 0 + 1 = e d 1 M ,
where by Lemma 5, ψ n ( N ) = ( p + q ) n 1 + j = 0 n 2 a j ( p + q ) j with known coefficients a j , j = 0 , , n 2 . Let H ( y ) = y n 1 + j = 0 n 2 a j y j , and consider the polynomial
f ( x , y ) = x H ( y ) e d 0 + 1 .
Then, ( x 0 , y 0 ) = ( k , p + q ) satisfies f ( x 0 , y 0 ) 0 ( mod e M ) . By Lemma 1, we have y 0 < 3 N . Also, we have
x 0 = k = e d 1 ψ n ( N ) < N α + δ n + 1 .
We can then apply Theorem 3 where α is replaced by α + μ , β is replaced by α + δ n + 1 , γ = 1 2 , and r = n 1 . Then, the inequality β < α + 1 3 r γ 2 3 3 r α γ + r 2 γ 2 in Theorem 3 leads to
δ < μ + 7 6 ( n 1 ) 1 3 6 ( n 1 ) ( α + μ ) + ( n 1 ) 2 .
After finding the solutions of the equation f ( x , y ) 0 ( mod e M ) , only one satisfies ( x 0 , y 0 ) = ( k , p + q ) . Then, combining y 0 = p + q , and N = p q , this leads to the factorization of N and terminates the proof. □

5. Cryptanalysis of the Scheme of Cotan and Teşeleanu with a Known Approximation of One of the Primes

In this section, we consider the scheme of Cotan and Teşeleanu with N = p q when p < q < 2 q , and an approximation p 0 of p is known.
Theorem 5.
Let n 2 , and N = p q be the product of two unknown prime factors with q < p < 2 q . Suppose that e d k ψ n ( N ) = 1 with ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) , e = N α , and d N δ . Let p 0 be an approximation of p with | p     p 0 |   < N μ . Then, one can factor N in polynomial time if
δ < 1 + 1 3 μ ( n 1 ) 2 3 3 ( n 1 ) μ α + ( n 1 ) 2 μ 2 .
Proof. 
Suppose that e d k ψ n ( N ) = 1 with e = N α and d N δ . This implies that k ψ n ( N ) + 1 0 ( mod e ) . Let p 0 be an approximation of p with | p     p 0 |   < N γ . Then, by Lemma 2, the integer q 0 = N p 0 is an approximation of q such that | q     q 0 |   < N μ and | p + q     p 0 q 0 |   < 2 N μ . Set M = p 0 + q 0 . By Lemma 6, one has ψ n ( N ) = ( p + q M ) n 1 + j = 0 n 2 a j ( n ) ( p + q M ) j . Then, the equation k ψ n ( N ) + 1 0 ( mod e ) can be rewritten as
k ( p + q M ) n 1 + j = 0 n 2 a j ( n ) ( p + q M ) j + 1 0 ( mod e ) .
Consider the polynomial F ( x , y ) = x H ( y ) + 1 with H ( y ) = y n 1 + j = 0 n 2 a j ( n ) y j . Then, ( x 0 , y 0 ) = ( k , p + q M ) is a solution of the modular polynomial equation F ( x , y ) 0 ( mod e ) . Using e d k ψ n ( N ) = 1 , e = N α , d N δ , and since ψ n ( N ) > p n 1 q n 1 = N n 1 , we obtain
k = e d 1 ψ n ( N ) < N α + δ N n 1 = N α + δ n + 1 .
Let X = N α + δ n + 1 and Y = N γ . Then, using r = n 1 , γ = μ , and β = α + δ n + 1 in Theorem 3, we obtain
δ < 1 + 1 3 μ ( n 1 ) 2 3 3 ( n 1 ) μ α + ( n 1 ) 2 μ 2 .
After finding the solutions of the equation F ( x , y ) 0 ( mod e ) , only one satisfies ( x 0 , y 0 ) = ( k , p + q M ) . Then, combining y 0 + M = p + q , and N = p q , this leads to the factorization of N and terminates the proof. □

6. Cryptanalysis of the Scheme of Cotan and Teşeleanu with Primes Sharing MSBs

The following result is a direct application of Theorem 5. It concerns the case of a modulus N = p q where the prime difference | p q | is small.
Corollary 1.
Let n 2 and N = p q be the product of two unknown prime factors with q < p < 2 q and p q < N μ . Suppose that e d k ψ n ( N ) = 1 with ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) , e = N α , and d N δ . Then, one can factor N in polynomial time if
δ < 1 + 1 3 μ ( n 1 ) 2 3 3 ( n 1 ) μ α + ( n 1 ) 2 μ 2 .
Proof. 
Suppose that p q < N μ . Since, by Lemma 1, we have q < N < p , one obtains
0 < p N < p q < N μ .
This implies that p 0 = N is an approximation of p such that | p     p 0 |   < N μ . Then, using Theorem 5, one can factor N = p q if
δ < 1 + 1 3 μ ( n 1 ) 2 3 3 ( n 1 ) μ α + ( n 1 ) 2 μ 2 .
This terminates the proof. □

7. Cryptanalysis of the Scheme of Cotan and Teşeleanu with Primes Sharing LSBs

In this section, we propose an attack on the scheme of Cotan and Teşeleanu when the prime factors share an amount of their least significant bits.
Let N = p q be an RSA modulus with q < p < 2 q . Suppose that p and q share their least significant bits so that p q = 2 s u for a known s and an unknown u. Then, the following result shows that one can find the s least significant bits of p and q and the 2 s least significant bits of p + q (see [22,23]).
Lemma 7.
Let N = p q be an RSA modulus with q < p < 2 q . Suppose that p q = 2 s u with a known s and an unknown u. Let u 0 be a solution of the equation z 2 N ( mod 2 s ) and
v 0 2 u 0 + N u 0 2 u 0 1 ( mod 2 2 s ) .
Then, p = 2 s p 1 + u 0 , q = 2 s q 1 + u 0 , and p + q = 2 2 s v + v 0 for some integers p 1 , q 1 , and v.
For p + q = 2 2 s v + v 0 , the following Lemma shows that ψ n ( N ) can be expressed as a polynomial in v with integer coefficients.
Lemma 8.
Let N = p q , n 2 , ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) , with p + q = 2 2 s v + v 0 . Then, there exist n 1 coefficients b j ( n ) Z , j = 0 , , n 2 , depending only on N, n, s, and v 0 such that
ψ n ( N ) = 2 2 s ( n 1 ) v n 1 + j = 0 n 2 b j ( n ) v j .
Proof. 
Since p + q = 2 2 s v + v 0 , then p + q v 0 = 2 2 s v . Then, by Lemma 6, with M = v 0 , there exist n 1 integers a j ( n ) , j = 0 , , n 2 , such that
ψ n ( N ) = ( p + q v 0 ) n 1 + j = 0 n 2 a j ( n ) ( p + q v 0 ) j .
Then,
ψ n ( N ) = 2 2 s v n 1 + j = 0 n 2 a j ( n ) 2 2 s v j = 2 2 s ( n 1 ) v n 1 + j = 0 n 2 2 2 s j a j ( n ) v j = 2 2 s ( n 1 ) v n 1 + j = 0 n 2 b j ( n ) v j ,
where b j = 2 2 s j a j ( n ) , j = 0 , , n 2 . This terminates the proof. □
The following result concerns the situation where the prime factors p and q share their least significant bits.
Theorem 6.
Let n 2 and N = p q be an RSA modulus with q < p < 2 q . Suppose that e = N α is odd and satisfies the equation e d k ψ n ( N ) = 1 with ψ n ( N ) = p n 1 q n 1 ( p 1 ) ( q 1 ) and d N δ . Suppose that p and q share their s least significant bits with 2 s = N μ . If
δ < 7 6 2 3 μ ( n 1 ) 2 3 3 ( n 1 ) α 1 2 2 μ + ( n 1 ) 2 1 2 2 μ 2 .
then one can factor N in polynomial time.
Proof. 
Assume that p and q share their least significant bits so that p q = 2 s v . Let u 0 be a solution of the equation z 2 N ( mod 2 s ) and,
v 0 2 u 0 + N u 0 2 u 0 1 ( mod 2 2 s ) .
Then, by Lemma 7, we have p = 2 s p 1 + u 0 , q = 2 s q 1 + u 0 , and p + q = 2 2 s v + v 0 . The equation e d k ψ n ( N ) = 1 can be rewritten as k ψ n ( N ) + 1 0 ( mod e ) , and by Lemma 8, we have
ψ n ( N ) = 2 2 s ( n 1 ) v n 1 + j = 0 n 2 b j ( n ) v j .
Suppose that e is odd. Then, gcd ( 2 , e ) = 1 , and the equation k ψ n ( N ) + 1 0 ( mod e ) can be rewritten as
k v n 1 + j = 0 n 2 b j ( n ) 2 2 s ( n 1 ) v j + 2 2 s ( n 1 ) 0 ( mod e ) ,
where 2 2 s ( n 1 ) is the inverse of 2 2 s ( n 1 ) modulo e. Consider the polynomial F ( x , y ) = x H ( y ) + c where H ( y ) = y n 1 + j = 0 n 2 b j ( n ) 2 2 s ( n 1 ) y j ( mod e ) , and c 2 2 s ( n 1 ) ( mod e ) . Then, ( x 0 , y 0 ) = ( k , v ) is a solution of the equation F ( x , y ) 0 ( mod e ) . Theorem 3 can then be applied to find the small solutions. Assume that e = N α , d N δ , and 2 s = N μ . Then, using e d k ψ n ( N ) = 1 , we obtain
k = e d 1 ψ n ( N ) < N α + δ n + 1 .
Also, using p + q = 2 2 s v + v 0 < 3 N , we obtain
v = p + q v 0 2 2 s < 3 N 1 2 2 μ .
Observe that 1 2 2 μ > 0 . Otherwise, one obtains v 2 , that is p + q = 2 2 s v + v 0 with v { 1 , 2 } . This leads to the factorization of N.
Let X = N α + δ n + 1 , and Y = 3 N 1 2 2 μ . Then, applying Theorem 3 with β = α + δ n + 1 , γ = 1 2 2 μ , and r = n 1 , we can find the solution ( x 0 , y 0 ) = ( k , v ) if
δ < 7 6 2 3 μ ( n 1 ) 2 3 3 ( n 1 ) α 1 2 2 μ + ( n 1 ) 2 1 2 2 μ 2 .
Using N = p q and v = y 0 , we obtain p + q = 2 2 s v + v 0 . This leads to the factorization of N. □

8. Conclusions

In this paper, we proposed a new technique to solve the modular equation x H ( y ) + c 0 ( mod e ) for small unknown integers x, y, and for an arbitrary value of c where H ( y ) Z [ y ] is a monic polynomial of degree r 1 . The methodology is based on Coppersmith’s method and lattice basis reduction. It finds the solutions in contrast to the former methods which fail when | c | | x y r | . As an application of our method, we present four attacks on the scheme of Cotan and Teşeleanu, namely a partial key exposure attack with known least significant bits, a partial prime exposure attack, and two attacks when the prime factors share their least or most significant bits.

Author Contributions

Conceptualization, M.R. and A.N.; methodology, M.R. and A.N.; software, M.R. and A.N.; validation, M.R., A.N. and M.Z.; formal analysis, M.R. and A.N.; investigation, M.R. and A.N.; resources, M.R. and A.N.; data curation, M.R. and A.N.; writing—original draft preparation, M.R. and A.N.; writing—review and editing, M.R. and A.N.; visualization, M.R. and A.N.; supervision, M.R., A.N. and M.Z.; project administration, M.R., A.N. and M.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
RSARivest, Shamir, Adleman
KMOVKoyama, Maurer, Okamoto, Vanstone
CRTChinese Remainder Theorem
MSBsmost significant bits
LSBsleast significant bits
LLLLenstra, Lenstra, and Lovász

References

  1. Rivest, R.; Shamir, A.; Adleman, L. A Method for Obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  2. Wiener, M. Cryptanalysis of short RSA secret exponents. IEEE Trans. Inf. Theory 1990, 36, 553–558. [Google Scholar] [CrossRef]
  3. Boneh, D.; Durfee, G. Cryptanalysis of RSA with private key d less than N0.292. In Advances in Cryptology-Eurocrypt’99, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1999; Volume 1592, pp. 1–11. [Google Scholar]
  4. Quisquater, J.J.; Couvreur, C. Fast decipherment algorithm for RSA public-key cryptosystem. Electron. Lett. 1982, 18, 905–907. [Google Scholar] [CrossRef]
  5. Koyama, K.; Maurer, U.M.; Okamoto, T.; Vanstone, S.A. New public-key schemes based on elliptic curves over the ring Zn. In Advances in Cryptology—CRYPTO 1991, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1991; Volume 576, pp. 252–266. [Google Scholar]
  6. Collins, T.; Hopkins, D.; Langford, S.; Sabin, M. Public Key Cryptographic Apparatus and Method. US Patent 5,848,159, 16 January 1997. [Google Scholar]
  7. Takagi, T. A fast RSA-type public-key primitive modulo pkq using Hensel lifting. IEICE Trans. 2004, 87, 94–101. [Google Scholar]
  8. Murru, N.; Saettone, F.M. A Novel RSA-Like Cryptosystem Based on a Generalization of the Rédei Rational Functions. In Number-Theoretic Methods in Cryptology. NuTMiC 2017. Lecture Notes in Computer Science; Kaczorowski, J., Pieprzyk, J., Pomykala, J., Eds.; Springer: Cham, Switzerland, 2018; Volume 10737. [Google Scholar]
  9. Feng, Y.; Nitaj, A.; Pan, Y. Partial prime factor exposure attacks on some RSA variants. In Theoretical Computer Science; Elsevier: Amsterdam, The Netherlands, 2024; Volume 999, p. 114549. [Google Scholar]
  10. Nitaj, A.; Ariffin, M.R.B.K.; Adenan, N.N.H.; Abu, N.A. Classical Attacks on a Variant of the RSA Cryptosystem. In LATINCRYPT 2021. Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2021; Volume 12912, pp. 151–167. [Google Scholar]
  11. Shi, G.; Wang, G.; Gu, D. Further Cryptanalysis of a Type of RSA Variants. In Information Security. ISC 2022. Lecture Notes in Computer Science; Susilo, W., Chen, X., Guo, F., Zhang, Y., Intan, R., Eds.; Springer: Cham, Switzerland, 2022; Volume 13640. [Google Scholar]
  12. Zheng, M.; Kunihiro, N.; Yao, Y. Cryptanalysis of the RSA variant based on cubic Pell equation. Theor. Comput. Sci. 2021, 889, 135–144. [Google Scholar] [CrossRef]
  13. Cotan, P.; Teşeleanu, G. Continued fractions applied to a family of RSA-like cryptosystems. In Information Security Practice and Experience. ISPEC 2022. Lecture Notes in Computer Science; Su, C., Gritzalis, D., Piuri, V., Eds.; Springer: Cham, Switzerland, 2022; Volume 13620, pp. 589–605. [Google Scholar]
  14. Nitaj, A.; Adenan, N.N.H.; Ariffin, M.R.K. Cryptanalysis of a New Variant of the RSA Cryptosystem. In Progress in Cryptology—AFRICACRYPT 2024. AFRICACRYPT 2024. Lecture Notes in Computer Science; Vaudenay, S., Petit, C., Eds.; Springer: Cham, Switzerland, 2024; Volume 14861. [Google Scholar]
  15. Lenstra, A.K.; Lenstra, H.W.; Lovász, L. Factoring polynomials with rational coefficients. Math. Ann. 1982, 261, 513–534. [Google Scholar] [CrossRef]
  16. May, A. New RSA Vulnerabilities Using Lattice Reduction Methods. Ph.D. Thesis, University of Paderborn, Paderborn, Germany, 2003. [Google Scholar]
  17. Coppersmith, D. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptol. 1997, 10, 233–260. [Google Scholar] [CrossRef]
  18. Howgrave-Graham, N. Finding small roots of univariate modular equations revisited. In Cryptography and Coding, LNCS 1355; Springer: Berlin/Heidelberg, Germany, 1997; pp. 131–142. [Google Scholar]
  19. Jochemsz, E.; May, A. A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. In ASIACRYPT 2006, LNCS 4284; Springer: Berlin/Heidelberg, Germany, 2006; pp. 267–282. [Google Scholar]
  20. Peng, L.; Hu, L.; Lu, Y.; Wei, H. An improved analysis on three variants of the RSA cryptosystem. In Proceedings of the International Conference on Information Security and Cryptology, Beijing, China, 4–6 November 2016; Springer: Cham, Switzerland, 2016; Volume 10143, pp. 140–149. [Google Scholar]
  21. Kunihiro, N. On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. In Information Security. ISC 2012. Lecture Notes in Computer Science; Gollmann, D., Freiling, F.C., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7483. [Google Scholar]
  22. Nitaj, A.; Ariffin, M.R.K.; Nassr, D.I.; Bahig, H.M. New attacks on the RSA cryptosystem. In AFRICACRYPT 2014, LNCS 8469; Pointcheval, D., Vergnaud, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2014; p. 178198. [Google Scholar]
  23. Steinfeld, R.; Zheng, Y. On the Security of RSA with Primes Sharing Least-Significant Bits. Appl. Algebra Eng. Commun. Comput. 2004, 15, 179200. [Google Scholar] [CrossRef]
Table 1. The matrix of the lattice for m = 2 , t = 1 with the polynomial H ( y ) = y 3 + a 2 y 2 + a 1 y + a 0 .
Table 1. The matrix of the lattice for m = 2 , t = 1 with the polynomial H ( y ) = y 3 + a 2 y 2 + a 1 y + a 0 .
G k , i , j 1yx xy xy 2 x 2 x 2 y x 2 y 2 z yz xz xyz xy 2 z z 2 yz 2
G 0 , 0 , 0 e 2 00000000000000
G 0 , 0 , 1 0 e 2 Y 0000000000000
G 0 , 1 , 0 00 e 2 X 000000000000
G 0 , 1 , 1 000 e 2 X Y 00000000000
G 0 , 1 , 2 0000 e 2 X Y 2 0000000000
G 0 , 2 , 0 00000 e 2 X 2 000000000
G 0 , 2 , 1 000000 e 2 X 2 Y 00000000
G 0 , 2 , 2 0000000 e 2 X 2 Y 2 0000000
G 1 , 0 , 0 0000 Z e 000000
G 1 , 0 , 1 00000 Y Z e 00000
G 1 , 1 , 0 000000 X Z e 0000
G 1 , 1 , 1 0000000 X Y Z e 000
G 1 , 1 , 2 00000000 X Y 2 Z e 00
G 2 , 0 , 0 00 Z 2 0
G 2 , 0 , 1 000 Y Z 2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Rahmani, M.; Nitaj, A.; Ziane, M. Partial Exposure Attacks on a New RSA Variant. Cryptography 2024, 8, 44. https://doi.org/10.3390/cryptography8040044

AMA Style

Rahmani M, Nitaj A, Ziane M. Partial Exposure Attacks on a New RSA Variant. Cryptography. 2024; 8(4):44. https://doi.org/10.3390/cryptography8040044

Chicago/Turabian Style

Rahmani, Mohammed, Abderrahmane Nitaj, and Mhammed Ziane. 2024. "Partial Exposure Attacks on a New RSA Variant" Cryptography 8, no. 4: 44. https://doi.org/10.3390/cryptography8040044

APA Style

Rahmani, M., Nitaj, A., & Ziane, M. (2024). Partial Exposure Attacks on a New RSA Variant. Cryptography, 8(4), 44. https://doi.org/10.3390/cryptography8040044

Article Metrics

Back to TopTop