New attacks on prime power N = prq using good approximation of φ(N)

This paper proposes three new attacks. Our first attack is based on the RSA key equation ed − kφ(N) = 1 where φ(N) = pr-1(p-1)(q-1). Let q <p <2q and 2p 3r+2/r+1 |p r-1/r+1 – q r-1/r+1| < 1/6Ny with d = Nδ. If δ < 1-y/2 we shows that k/d can be recovered among the convergents of the cont...

Full description

Bibliographic Details
Main Authors: Shehu, Sadiq, Kamel Ariffin, Muhammad Rezal
Format: Article
Language:English
Published: Institute for Mathematical Research, Universiti Putra Malaysia 2017
Online Access:http://psasir.upm.edu.my/id/eprint/58180/
http://psasir.upm.edu.my/id/eprint/58180/1/121-138.pdf
_version_ 1848853574709149696
author Shehu, Sadiq
Kamel Ariffin, Muhammad Rezal
author_facet Shehu, Sadiq
Kamel Ariffin, Muhammad Rezal
author_sort Shehu, Sadiq
building UPM Institutional Repository
collection Online Access
description This paper proposes three new attacks. Our first attack is based on the RSA key equation ed − kφ(N) = 1 where φ(N) = pr-1(p-1)(q-1). Let q <p <2q and 2p 3r+2/r+1 |p r-1/r+1 – q r-1/r+1| < 1/6Ny with d = Nδ. If δ < 1-y/2 we shows that k/d can be recovered among the convergents of the continued fractions expansions of e/N-2N r/r+1 + N r-1/r+1. We furthered our analysis on j prime power moduli Ni = priqi satisfying a variant of the above mentioned condition. We utilized the LLL algorithm on j prime power public keys (Ni, ei) with Ni = priqi and we were able to factorize the j prime power moduli Ni = priqi simultaneously in polynomial time.
first_indexed 2025-11-15T10:56:08Z
format Article
id upm-58180
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T10:56:08Z
publishDate 2017
publisher Institute for Mathematical Research, Universiti Putra Malaysia
recordtype eprints
repository_type Digital Repository
spelling upm-581802018-01-04T03:13:39Z http://psasir.upm.edu.my/id/eprint/58180/ New attacks on prime power N = prq using good approximation of φ(N) Shehu, Sadiq Kamel Ariffin, Muhammad Rezal This paper proposes three new attacks. Our first attack is based on the RSA key equation ed − kφ(N) = 1 where φ(N) = pr-1(p-1)(q-1). Let q <p <2q and 2p 3r+2/r+1 |p r-1/r+1 – q r-1/r+1| < 1/6Ny with d = Nδ. If δ < 1-y/2 we shows that k/d can be recovered among the convergents of the continued fractions expansions of e/N-2N r/r+1 + N r-1/r+1. We furthered our analysis on j prime power moduli Ni = priqi satisfying a variant of the above mentioned condition. We utilized the LLL algorithm on j prime power public keys (Ni, ei) with Ni = priqi and we were able to factorize the j prime power moduli Ni = priqi simultaneously in polynomial time. Institute for Mathematical Research, Universiti Putra Malaysia 2017 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/58180/1/121-138.pdf Shehu, Sadiq and Kamel Ariffin, Muhammad Rezal (2017) New attacks on prime power N = prq using good approximation of φ(N). Malaysian Journal of Mathematical Sciences, 11 (spec. Aug.). pp. 121-138. ISSN 1823-8343; ESSN: 2289-750X http://einspem.upm.edu.my/journal/fullpaper/vol11saugust/121-138.pdf
spellingShingle Shehu, Sadiq
Kamel Ariffin, Muhammad Rezal
New attacks on prime power N = prq using good approximation of φ(N)
title New attacks on prime power N = prq using good approximation of φ(N)
title_full New attacks on prime power N = prq using good approximation of φ(N)
title_fullStr New attacks on prime power N = prq using good approximation of φ(N)
title_full_unstemmed New attacks on prime power N = prq using good approximation of φ(N)
title_short New attacks on prime power N = prq using good approximation of φ(N)
title_sort new attacks on prime power n = prq using good approximation of φ(n)
url http://psasir.upm.edu.my/id/eprint/58180/
http://psasir.upm.edu.my/id/eprint/58180/
http://psasir.upm.edu.my/id/eprint/58180/1/121-138.pdf