Paper 2016/007
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, and Damien Vergnaud
Abstract
The \emph{Coppersmith methods} is a family of lattice-based techniques to find small integer roots of polynomial equations. They have found numerous applications in cryptanalysis and, in recent developments, we have seen applications where the number of unknowns and the number of equations are non-constant. In these cases, the combinatorial analysis required to settle the complexity and the success condition of the method becomes very intricate. We provide a toolbox based on \emph{analytic combinatorics} for these studies. It uses the structure of the considered polynomials to derive their generating functions and applies complex analysis techniques to get asymptotics. The toolbox is versatile and can be used for many different applications, including multivariate polynomial systems with arbitrarily many unknowns (of possibly different sizes) and simultaneous modular equations over different moduli. To demonstrate the power of this approach, we apply it to recent cryptanalytic results on number-theoretic pseudorandom generators for which we easily derive precise and formal analysis. We also present new theoretical applications to two problems on RSA key generation and randomness generation used in padding functions for encryption.
Metadata
- Available format(s)
- Publication info
- A major revision of an IACR publication in PKC 2016
- Keywords
- Coppersmith MethodsAnalytic CombinatoricsCryptanalysisPseudorandom GeneratorsRSA Key GenerationEncryption Padding
- Contact author(s)
- fabrice ben hamouda @ ens fr
- History
- 2016-01-04: received
- Short URL
- https://ia.cr/2016/007
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/007, author = {Fabrice Benhamouda and Céline Chevalier and Adrian Thillard and Damien Vergnaud}, title = {Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/007}, year = {2016}, url = {https://eprint.iacr.org/2016/007} }