New weak findings upon RSA modulo of type N = p2 q
This paper proposes new attacks on RSA with the modulus N = p2 q. The first attack is based on the equation eX −NY = p2 u+q2 v +Z such that u is an integer multiple of 2 and v is an integer multiple of 3. If |p2 u − q2 v| < N1/2, |Z| ■(|p^2 - q^2 | @3(p^2 + q^2)) < N1/3 and X < ▁((...
| Main Authors: | Kamel Ariffin, Muhammad Rezal, Nek Abd Rahman, Normahirah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Research India Publications
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/53380/ http://psasir.upm.edu.my/id/eprint/53380/1/New%20weak%20findings%20upon%20RSA%20.pdf |
Similar Items
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
A new simultaneous diophantine attack upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2018)
by: Abubakar, Saidu Isah, et al.
Published: (2018)
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019)
by: Abubakar, Saidu Isah, et al.
Published: (2019)
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
New directions in factoring the prime power RSA modulus N = prq
by: Shehu, Sadiq, et al.
Published: (2016)
by: Shehu, Sadiq, et al.
Published: (2016)
Concurrent factorization of RSA moduli via weak key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
A new attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
On spectrum and energy of identity graph for group of integers modulo n, Zn
by: Romdhini, Mamika Ujianita, et al.
Published: (2024)
by: Romdhini, Mamika Ujianita, et al.
Published: (2024)
A new LSB attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
Novel implementation method of modulo 2N multiplication for digital signal processing
by: Nun, Mohamed Arif
Published: (1981)
by: Nun, Mohamed Arif
Published: (1981)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
Alternative method to find the number of points on Koblitz curve
by: Hadani, Nurul Hafizah, et al.
Published: (2019)
by: Hadani, Nurul Hafizah, et al.
Published: (2019)
Extending Pollard class of factorable RSA modulus
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2018)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2018)
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Introducing S-index into factoring RSA modulus via Lucas sequences
by: Abu, Nur Azman, et al.
Published: (2017)
by: Abu, Nur Azman, et al.
Published: (2017)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
Security issues of Novel RSA variant
by: Nitaj, Abderrahmane, et al.
Published: (2022)
by: Nitaj, Abderrahmane, et al.
Published: (2022)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
An attack on N = p2q with partially known bits on the multiple of the prime factors
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
On (unknowingly) using near-square RSA primes
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
A comparative S-index in factoring RSA modulus via Lucas sequences
by: Abu, Nur Azman, et al.
Published: (2016)
by: Abu, Nur Azman, et al.
Published: (2016)
Partial key attack given MSBs of CRT-RSA private keys
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Exponential increment of RSA attack range via lattice based cryptanalysis
by: Nitaj, Abderahmanne, et al.
Published: (2021)
by: Nitaj, Abderahmanne, et al.
Published: (2021)
New attacks on prime power N = prq using good approximation of φ(N)
by: Shehu, Sadiq, et al.
Published: (2017)
by: Shehu, Sadiq, et al.
Published: (2017)
Similar Items
-
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016) -
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017) -
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014) -
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021) -
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)