Paper 2024/1263

A Security Analysis of Two Classes of RSA-like Cryptosystems

Paul Cotan
George Teseleanu
Abstract

Let N=pq be the product of two balanced prime numbers p and q. In 2002, Elkamchouchi, Elshenawy and Shaban introduced an RSA-like cryptosystem that uses the key equation edk(p21)(q21)=1, instead of the classical RSA key equation edk(p1)(q1)=1. Another variant of RSA, presented in 2017 by Murru and Saettone, uses the key equation edk(p2+p+1)(q2+q+1)=1. Despite the authors' claims of enhanced security, both schemes remain vulnerable to adaptations of common RSA attacks. Let n be an integer. This paper proposes two families of RSA-like encryption schemes: one employs the key equation for , while the other uses for . Note that we remove the conventional assumption of primes having equal bit sizes. In this scenario, we show that regardless of the choice of , continued fraction-based attacks can still recover the secret exponent. Additionally, this work fills a gap in the literature by establishing an equivalent of Wiener's attack when the primes do not have the same bit size.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Journal of Mathematical Cryptography
Keywords
continued fractionssmall private key attackRSA
Contact author(s)
paulcotan @ gmail com
george teseleanu @ yahoo com
History
2024-08-12: approved
2024-08-09: received
See all versions
Short URL
https://ia.cr/2024/1263
License
Creative Commons Attribution-NonCommercial-ShareAlike
CC BY-NC-SA

BibTeX

@misc{cryptoeprint:2024/1263,
      author = {Paul Cotan and George Teseleanu},
      title = {A Security Analysis of Two Classes of {RSA}-like Cryptosystems},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1263},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1263}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.