Paper 2024/061
Partial Key Exposure Attack on Common Prime RSA
Abstract
In this paper, we focus on the common prime RSA variant and introduces a novel investigation into the partial key exposure attack targeting it. We explore the vulnerability of this RSA variant, which employs two common primes $p$ and $q$ defined as $p=2ga+1$ and $q=2gb+1$ for a large prime $g$. Previous cryptanalysis of common prime RSA has primarily focused on the small private key attack. In our work, we delve deeper into the realm of partial key exposure attacks by categorizing them into three distinct cases. We are able to identify weak private keys that are susceptible to partial key exposure by using the lattice-based method for solving simultaneous modular univariate linear equations. To validate the effectiveness and soundness of our proposed attacks, we conduct experimental evaluations. Through these examinations, we demonstrate the validity and practicality of the proposed partial key exposure attacks on common prime RSA.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. Major revision. Inscrypt 2023
- Keywords
- CryptanalysisCommon Prime RSAWeak KeyPartial Key Exposure AttackLattice
- Contact author(s)
- mengce zheng @ gmail com
- History
- 2024-01-17: approved
- 2024-01-16: received
- See all versions
- Short URL
- https://ia.cr/2024/061
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/061, author = {Mengce Zheng}, title = {Partial Key Exposure Attack on Common Prime {RSA}}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/061}, year = {2024}, url = {https://eprint.iacr.org/2024/061} }