Paper 2008/228

Revisiting Wiener's Attack -- New Weak Keys in RSA

Subhamoy Maitra and Santanu Sarkar

Abstract

In this paper we revisit Wiener's method (IEEE-IT 1990) of continued fraction (CF) to find new weaknesses in RSA. We consider RSA with N=pq, q<p<2q, public encryption exponent e and private decryption exponent d. Our motivation is to find out when RSA is insecure given d is O(Nδ), where we are mostly interested in the range 0.3δ0.5. Given ρ (1ρ2) is known to the attacker, we show that the RSA keys are weak when d=Nδ and δ<12γ2, where |ρqp|Nγ16. This presents additional results over the work of de Weger (AAECC 2002). We also discuss how the lattice based idea of Boneh-Durfee (IEEE-IT 2000) works better to find weak keys beyond the bound δ<12γ2. Further we show that, the RSA keys are weak when d<12Nδ and e is O(N322δ) for δ12. Using similar techniques we also present new results over the work of Blömer and May (PKC 2004).

Note: Substantial Revision.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. ISC 2008, 11th Information Security Conference, September 15-18, 2008, Taipei, Taiwan, to be published in Lecture Notes in Computer Science, Springer, 2008.
Keywords
CryptanalysisRSAFactorizationWeak Keys.
Contact author(s)
subho @ isical ac in
History
2009-02-20: last of 2 revisions
2008-05-26: received
See all versions
Short URL
https://ia.cr/2008/228
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/228,
      author = {Subhamoy Maitra and Santanu Sarkar},
      title = {Revisiting Wiener's Attack -- New Weak Keys in {RSA}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2008/228},
      year = {2008},
      url = {https://eprint.iacr.org/2008/228}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.