Paper 2024/1903

Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus

Mahdi Mahdavi, Universitat Oberta de Catalunya, Shahid Beheshti University
Navid Abapour, University of Surrey
Zahra Ahmadian, Shahid Beheshti University
Abstract

With the increasing integration of crowd computing, new vulnerabilities emerge in widely used cryptographic systems like the RSA cryptosystem, whose security is based on the factoring problem. It is strongly advised to avoid using the same modulus to produce two pairs of public-private keys, as the cryptosystem would be rendered vulnerable to common modulus attacks. Such attacks can take two forms: one that aims to factorize the common modulus based on one key pair and the other that aims to decrypt certain ciphertexts generated by two public keys if the keys are co-prime. This paper introduces a new type of common modulus attack on the RSA cryptosystem. In our proposed attack, given one public-private key pair, an attacker can obtain the private key corresponding to a given public key in RSA decryption. This allows the adversary to decrypt any ciphertext generated using this public key. It is worth noting that the proposed attack can be used in the CRT model of RSA. In addition, we propose a parallelizable factoring algorithm with an order equivalent to a cyclic attack in the worst-case scenario.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Minor revision. IEEE TrustCom 2024
Keywords
Common Modulus AttackRSA VulnerabilityKey Finding AttacksFactoring Algorithm
Contact author(s)
mmahdavi_oliaee @ uoc edu
n abapour @ surrey ac uk
z_ahmadian @ sbu ac ir
History
2024-11-25: approved
2024-11-22: received
See all versions
Short URL
https://ia.cr/2024/1903
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1903,
      author = {Mahdi Mahdavi and Navid Abapour and Zahra Ahmadian},
      title = {Trustworthy Approaches to {RSA}: Efficient Exploitation Strategies Based on Common Modulus},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1903},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1903}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.