Paper 2024/061

Partial Key Exposure Attack on Common Prime RSA

Mengce Zheng, Zhejiang Wanli University
Abstract

In this paper, we focus on the common prime RSA variant and introduces a novel investigation into the partial key exposure attack targeting it. We explore the vulnerability of this RSA variant, which employs two common primes $p$ and $q$ defined as $p=2ga+1$ and $q=2gb+1$ for a large prime $g$. Previous cryptanalysis of common prime RSA has primarily focused on the small private key attack. In our work, we delve deeper into the realm of partial key exposure attacks by categorizing them into three distinct cases. We are able to identify weak private keys that are susceptible to partial key exposure by using the lattice-based method for solving simultaneous modular univariate linear equations. To validate the effectiveness and soundness of our proposed attacks, we conduct experimental evaluations. Through these examinations, we demonstrate the validity and practicality of the proposed partial key exposure attacks on common prime RSA.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. Major revision. Inscrypt 2023
Keywords
CryptanalysisCommon Prime RSAWeak KeyPartial Key Exposure AttackLattice
Contact author(s)
mengce zheng @ gmail com
History
2024-01-17: approved
2024-01-16: received
See all versions
Short URL
https://ia.cr/2024/061
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/061,
      author = {Mengce Zheng},
      title = {Partial Key Exposure Attack on Common Prime RSA},
      howpublished = {Cryptology ePrint Archive, Paper 2024/061},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/061}},
      url = {https://eprint.iacr.org/2024/061}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.