Paper 2015/399

New attacks on RSA with Moduli N=prq

Abderrahmane Nitaj and Tajjeeddine Rachidi

Abstract

We present three attacks on the Prime Power RSA with modulus N=prq. In the first attack, we consider a public exponent e satisfying an equation exϕ(N)y=z where ϕ(N)=pr1(p1)(q1). We show that one can factor N if the parameters |x| and |z| satisfy |xz|<Nr(r1)(r+1)2 thereby extending the recent results of Sakar~\cite{SARKAR}. In the second attack, we consider two public exponents e1 and e2 and their corresponding private exponents d1 and d2. We show that one can factor N when d1 and d2 share a suitable amount of their most significant bits, that is |d1d2|<Nr(r1)(r+1)2. The third attack enables us to factor two Prime Power RSA moduli N1=p1rq1 and N2=p2rq2 when p1 and p2 share a suitable amount of their most significant bits, namely, |p1p2|<p12rq1q2.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. C2SI-Berger2015
Keywords
RSA
Contact author(s)
abderrahmane nitaj @ unicaen fr
History
2015-05-01: received
Short URL
https://ia.cr/2015/399
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/399,
      author = {Abderrahmane Nitaj and Tajjeeddine Rachidi},
      title = {New attacks on  {RSA} with Moduli $N=p^rq$},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/399},
      year = {2015},
      url = {https://eprint.iacr.org/2015/399}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.