Paper 2021/972

Partial Key Exposure Attack on Short Secret Exponent CRT-RSA

Alexander May, Julian Nowakowski, and Santanu Sarkar

Abstract

Let (N,e) be an RSA public key, where N=pq is the product of equal bitsize primes p,q. Let dp,dq be the corresponding secret CRT-RSA exponents. Using a Coppersmith-type attack, Takayasu, Lu and Peng (TLP) recently showed that one obtains the factorization of N in polynomial time, provided that dp,dqN0.122. Building on the TLP attack, we show the first Partial Key Exposure attack on short secret exponent CRT-RSA. Namely, let N0.122dp,dqN0.5. Then we show that a constant known fraction of the least significant bits (LSBs) of both dp,dq suffices to factor N in polynomial time. Naturally, the larger , the more LSBs are required. E.g. if are of size , then we have to know roughly a -fraction of their LSBs, whereas for of size we require already knowledge of a -LSB fraction. Eventually, if are of full size , we have to know all of their bits. Notice that as a side-product of our result we obtain a heuristic deterministic polynomial time factorization algorithm on input .

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A minor revision of an IACR publication in ASIACRYPT 2021
Keywords
CRT-RSACoppersmith’s methodPartial Key Exposure
Contact author(s)
julian nowakowski @ rub de
History
2021-11-15: revised
2021-07-22: received
See all versions
Short URL
https://ia.cr/2021/972
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/972,
      author = {Alexander May and Julian Nowakowski and Santanu Sarkar},
      title = {Partial Key Exposure Attack on Short Secret Exponent {CRT}-{RSA}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/972},
      year = {2021},
      url = {https://eprint.iacr.org/2021/972}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.