Paper 2024/1903
Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus
Abstract
With the increasing integration of crowd computing, new vulnerabilities emerge in widely used cryptographic systems like the RSA cryptosystem, whose security is based on the factoring problem. It is strongly advised to avoid using the same modulus to produce two pairs of public-private keys, as the cryptosystem would be rendered vulnerable to common modulus attacks. Such attacks can take two forms: one that aims to factorize the common modulus based on one key pair and the other that aims to decrypt certain ciphertexts generated by two public keys if the keys are co-prime. This paper introduces a new type of common modulus attack on the RSA cryptosystem. In our proposed attack, given one public-private key pair, an attacker can obtain the private key corresponding to a given public key in RSA decryption. This allows the adversary to decrypt any ciphertext generated using this public key. It is worth noting that the proposed attack can be used in the CRT model of RSA. In addition, we propose a parallelizable factoring algorithm with an order equivalent to a cyclic attack in the worst-case scenario.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Minor revision. IEEE TrustCom 2024
- Keywords
- Common Modulus AttackRSA VulnerabilityKey Finding AttacksFactoring Algorithm
- Contact author(s)
-
mmahdavi_oliaee @ uoc edu
n abapour @ surrey ac uk
z_ahmadian @ sbu ac ir - History
- 2024-11-25: approved
- 2024-11-22: received
- See all versions
- Short URL
- https://ia.cr/2024/1903
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1903, author = {Mahdi Mahdavi and Navid Abapour and Zahra Ahmadian}, title = {Trustworthy Approaches to {RSA}: Efficient Exploitation Strategies Based on Common Modulus}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1903}, year = {2024}, url = {https://eprint.iacr.org/2024/1903} }