Next Article in Journal
Multiparty Homomorphic Encryption for IoV Based on Span Program and Conjugate Search Problem
Previous Article in Journal
Key Derivation: A Dynamic PBKDF2 Model for Modern Cryptographic Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

An Improved Attack on the RSA Variant Based on Cubic Pell Equation

1
ACSA Laboratory, Department of Mathematics and Computer Science, Sciences Faculty, Mohammed First University, Oujda 60000, Morocco
2
LMNO, CNRS, UNICAEN, Caen Normandie University, 14000 Caen, France
3
Faculty of Sciences and Technology Al Hoceima, Abdelmalek Essaadi University, BP 34. Ajdir, Al Hoceima 32003, Morocco
*
Author to whom correspondence should be addressed.
Cryptography 2025, 9(2), 40; https://doi.org/10.3390/cryptography9020040
Submission received: 25 April 2025 / Revised: 2 June 2025 / Accepted: 3 June 2025 / Published: 6 June 2025

Abstract

In this paper, we present a novel method to solve trivariate polynomial modular equations of the form x(y2+Ay+B)+z0(mode). Our approach integrates Coppersmith’s method with lattice basis reduction to efficiently solve the former equation. Several variants of RSA are based on the cubic Pell equation x3+fy3+f2z33fxyz1(modN), where f is a cubic nonresidue modulus N=pq. In these variants, the public exponent e and the private exponent d satisfy ed1(modψ(N)) with ψ(N)=p2+p+1q2+q+1. Moreover, d can be written in the form dv0z0(modψ(N)) with any z0 satisfying gcd(z0,ψ(N))=1. In this paper, we apply our method to attack the variants when dv0z0(modψ(N)) and when |z0| and |v0| are suitably small. We also show that our method significantly improves the bounds of the private exponents d of the previous attacks on the variants, particularly in the scenario of small private exponents and in the scenarios where partial information about the primes is available.
Keywords: Coppersmith’s method; lattice basis reduction; RSA variants; factorization Coppersmith’s method; lattice basis reduction; RSA variants; factorization

Share and Cite

MDPI and ACS Style

Rahmani, M.; Nitaj, A.; Tadmori, A.; Ziane, M. An Improved Attack on the RSA Variant Based on Cubic Pell Equation. Cryptography 2025, 9, 40. https://doi.org/10.3390/cryptography9020040

AMA Style

Rahmani M, Nitaj A, Tadmori A, Ziane M. An Improved Attack on the RSA Variant Based on Cubic Pell Equation. Cryptography. 2025; 9(2):40. https://doi.org/10.3390/cryptography9020040

Chicago/Turabian Style

Rahmani, Mohammed, Abderrahmane Nitaj, Abdelhamid Tadmori, and Mhammed Ziane. 2025. "An Improved Attack on the RSA Variant Based on Cubic Pell Equation" Cryptography 9, no. 2: 40. https://doi.org/10.3390/cryptography9020040

APA Style

Rahmani, M., Nitaj, A., Tadmori, A., & Ziane, M. (2025). An Improved Attack on the RSA Variant Based on Cubic Pell Equation. Cryptography, 9(2), 40. https://doi.org/10.3390/cryptography9020040

Article Metrics

Back to TopTop