Paper 2025/380

A New Generalized Attack on RSA-like Cryptosystems

Michel SECK, LTISI, CRISIN'2D, Ecole Polytechnique de Thies, Senegal
Oumar Niang, LTISI, CRISIN'2D, Ecole Polytechnique de Thies, Senegal
Djiby Sow, Dept. Mathematics and Computer Science, FST, UCAD, Senegal
Abstract

Rivest, Shamir, and Adleman published the RSA cryptosystem in 1978, which has been widely used over the last four decades. The security of RSA is based on the difficulty of factoring large integers N=pq, where p and q are prime numbers. The public exponent e and the private exponent d are related by the equation edk(p1)(q1)=1. Recently, Cotan and Te{\c{s}}eleanu (NordSec 2023) introduced a variant of RSA, where the public exponent e and the private exponent d satisfy the equation edk(pn1)(qn1)=1 for some positive integer . In this paper, we study the general equation with positive integers and , and . We show that, given the public parameters and , one can recover and and factor the modulus in polynomial time by combining continued fractions with Coppersmith's algorithm which relies on lattice reduction techniques, under specific conditions on , , and . Furthermore, we show that if the private exponent in an RSA-like cryptosystem is either small or too large, then can be factored in polynomial time. This attack applies to the standard RSA cryptosystem.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
RSAContinued fractionsCrypanalysisCoppersmith's methodGeneralized Wiener attack
Contact author(s)
mseck @ ept edu sn
oniang @ ept edu sn
djiby sow @ ucad edu sn
History
2025-03-04: approved
2025-02-27: received
See all versions
Short URL
https://ia.cr/2025/380
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/380,
      author = {Michel SECK and Oumar Niang and Djiby Sow},
      title = {A New Generalized Attack on {RSA}-like Cryptosystems},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/380},
      year = {2025},
      url = {https://eprint.iacr.org/2025/380}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.