Paper 2021/1632

Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits

Meryem Cherkaoui-Semmouni, Abderrahmane Nitaj, Willy Susilo, and Joseph Tonien

Abstract

We consider four variants of the RSA cryptosystem with an RSA modulus N=pq where the public exponent e and the private exponent d satisfy an equation of the form edk(p21)(q21)=1. We show that, if the prime numbers p and q share most significant bits, that is, if the prime difference |pq| is sufficiently small, then one can solve the equation for larger values of d, and factor the RSA modulus, which makes the systems insecure.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Information Security Conference ISC 2021
DOI
10.1007/978-3-030-91356-4_3
Keywords
RSA variantsContinued fractionsCoppersmith's methodLattice reduction
Contact author(s)
abderrahmane nitaj @ unicaen fr
History
2021-12-17: received
Short URL
https://ia.cr/2021/1632
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1632,
      author = {Meryem Cherkaoui-Semmouni and Abderrahmane Nitaj and Willy Susilo and Joseph Tonien},
      title = {Cryptanalysis of {RSA} Variants with Primes Sharing Most Significant Bits},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/1632},
      year = {2021},
      doi = {10.1007/978-3-030-91356-4_3},
      url = {https://eprint.iacr.org/2021/1632}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.