Paper 2020/1214

Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack

Majid Mumtaz and Ping Luo

Abstract

Boneh-Durfee proposed (at Eurocrypt 1999) a polynomial time attacks on RSA small decryption exponent which exploits lattices and sub-lattice structure to obtain an optimized bounds d < N^0.284 and d < N^0.292 respectively using lattice based Coppersmith’s method. In this paper we propose a special case of Boneh-Durfee’s attack with respect to large private exponent (i.e. d = N^&#949; > e = N^&#945; where &#949; and &#945; are the private and public key exponents respectively) for some &#945; &#8804; &#949;, which satisfy the condition d > &#966;(N) &#8722; N^&#949;. We analyzed lattices whose basis matrices are triangular and non-triangular using large decryption exponent and focus group attacks respectively. The core objective is to explore RSA polynomials underlying algebraic structure so that we can improve the performance of weak key attacks. In our solution, we implemented the attack and perform several experiments to show that an RSA cryptosystem successfully attacked and revealed possible weak keys which can ultimately enables an adversary to factorize the RSA modulus.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Contact author(s)
maji16 @ mails tsinghua edu cn
History
2020-10-06: received
Short URL
https://ia.cr/2020/1214
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1214,
      author = {Majid Mumtaz and Ping Luo},
      title = {Cryptanalysis of {RSA}: A Special Case of Boneh-Durfee’s Attack},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/1214},
      year = {2020},
      url = {https://eprint.iacr.org/2020/1214}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.