SPA on Rabin variant with public key N= p2q

Variants of the Rabin cryptosystem are built to overcome the decryption failure problem encountered by the cryptosystem. In this paper, we perform a theoretical simple power analysis on one of the variants that operates its decryption procedure via modular multiplication where the moduli N1=pq is ke...

Full description

Bibliographic Details
Main Authors: Abd Ghafar, Amir Hamzah, Kamel Ariffin, Muhammad Rezal
Format: Article
Language:English
Published: Springer 2016
Online Access:http://psasir.upm.edu.my/id/eprint/53855/
http://psasir.upm.edu.my/id/eprint/53855/1/SPA%20on%20Rabin%20variant%20with%20public%20key%20N%3Dp2q.pdf
_version_ 1848852393031106560
author Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
author_facet Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
author_sort Abd Ghafar, Amir Hamzah
building UPM Institutional Repository
collection Online Access
description Variants of the Rabin cryptosystem are built to overcome the decryption failure problem encountered by the cryptosystem. In this paper, we perform a theoretical simple power analysis on one of the variants that operates its decryption procedure via modular multiplication where the moduli N1=pq is kept secret while the moduli N=p2q is public. The attack utilizes Legendre’s theorem of continued fraction to successfully retrieve the secret key of the cryptosystem. An example of the attack is also included in this paper.
first_indexed 2025-11-15T10:37:21Z
format Article
id upm-53855
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T10:37:21Z
publishDate 2016
publisher Springer
recordtype eprints
repository_type Digital Repository
spelling upm-538552018-02-14T02:32:58Z http://psasir.upm.edu.my/id/eprint/53855/ SPA on Rabin variant with public key N= p2q Abd Ghafar, Amir Hamzah Kamel Ariffin, Muhammad Rezal Variants of the Rabin cryptosystem are built to overcome the decryption failure problem encountered by the cryptosystem. In this paper, we perform a theoretical simple power analysis on one of the variants that operates its decryption procedure via modular multiplication where the moduli N1=pq is kept secret while the moduli N=p2q is public. The attack utilizes Legendre’s theorem of continued fraction to successfully retrieve the secret key of the cryptosystem. An example of the attack is also included in this paper. Springer 2016 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/53855/1/SPA%20on%20Rabin%20variant%20with%20public%20key%20N%3Dp2q.pdf Abd Ghafar, Amir Hamzah and Kamel Ariffin, Muhammad Rezal (2016) SPA on Rabin variant with public key N= p2q. Journal of Cryptographic Engineering, 6 (4). pp. 339-346. ISSN 2190-8508; ESSN: 2190-8516 https://link.springer.com/article/10.1007/s13389-016-0118-5 10.1007/s13389-016-0118-5
spellingShingle Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
SPA on Rabin variant with public key N= p2q
title SPA on Rabin variant with public key N= p2q
title_full SPA on Rabin variant with public key N= p2q
title_fullStr SPA on Rabin variant with public key N= p2q
title_full_unstemmed SPA on Rabin variant with public key N= p2q
title_short SPA on Rabin variant with public key N= p2q
title_sort spa on rabin variant with public key n= p2q
url http://psasir.upm.edu.my/id/eprint/53855/
http://psasir.upm.edu.my/id/eprint/53855/
http://psasir.upm.edu.my/id/eprint/53855/
http://psasir.upm.edu.my/id/eprint/53855/1/SPA%20on%20Rabin%20variant%20with%20public%20key%20N%3Dp2q.pdf