New attacks on prime power N = prq using good approximation of φ(N)
This paper proposes three new attacks. Our first attack is based on the RSA key equation ed − kφ(N) = 1 where φ(N) = pr-1(p-1)(q-1). Let q <p <2q and 2p 3r+2/r+1 |p r-1/r+1 – q r-1/r+1| < 1/6Ny with d = Nδ. If δ < 1-y/2 we shows that k/d can be recovered among the convergents of the cont...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute for Mathematical Research, Universiti Putra Malaysia
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/58180/ http://psasir.upm.edu.my/id/eprint/58180/1/121-138.pdf |
| _version_ | 1848853574709149696 |
|---|---|
| author | Shehu, Sadiq Kamel Ariffin, Muhammad Rezal |
| author_facet | Shehu, Sadiq Kamel Ariffin, Muhammad Rezal |
| author_sort | Shehu, Sadiq |
| building | UPM Institutional Repository |
| collection | Online Access |
| description | This paper proposes three new attacks. Our first attack is based on the RSA key equation ed − kφ(N) = 1 where φ(N) = pr-1(p-1)(q-1). Let q <p <2q and 2p 3r+2/r+1 |p r-1/r+1 – q r-1/r+1| < 1/6Ny with d = Nδ. If δ < 1-y/2 we shows that k/d can be recovered among the convergents of the continued fractions expansions of e/N-2N r/r+1 + N r-1/r+1. We furthered our analysis on j prime power moduli Ni = priqi satisfying a variant of the above mentioned condition. We utilized the LLL algorithm on j prime power public keys (Ni, ei) with Ni = priqi and we were able to factorize the j prime power moduli Ni = priqi simultaneously in polynomial time. |
| first_indexed | 2025-11-15T10:56:08Z |
| format | Article |
| id | upm-58180 |
| institution | Universiti Putra Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T10:56:08Z |
| publishDate | 2017 |
| publisher | Institute for Mathematical Research, Universiti Putra Malaysia |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | upm-581802018-01-04T03:13:39Z http://psasir.upm.edu.my/id/eprint/58180/ New attacks on prime power N = prq using good approximation of φ(N) Shehu, Sadiq Kamel Ariffin, Muhammad Rezal This paper proposes three new attacks. Our first attack is based on the RSA key equation ed − kφ(N) = 1 where φ(N) = pr-1(p-1)(q-1). Let q <p <2q and 2p 3r+2/r+1 |p r-1/r+1 – q r-1/r+1| < 1/6Ny with d = Nδ. If δ < 1-y/2 we shows that k/d can be recovered among the convergents of the continued fractions expansions of e/N-2N r/r+1 + N r-1/r+1. We furthered our analysis on j prime power moduli Ni = priqi satisfying a variant of the above mentioned condition. We utilized the LLL algorithm on j prime power public keys (Ni, ei) with Ni = priqi and we were able to factorize the j prime power moduli Ni = priqi simultaneously in polynomial time. Institute for Mathematical Research, Universiti Putra Malaysia 2017 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/58180/1/121-138.pdf Shehu, Sadiq and Kamel Ariffin, Muhammad Rezal (2017) New attacks on prime power N = prq using good approximation of φ(N). Malaysian Journal of Mathematical Sciences, 11 (spec. Aug.). pp. 121-138. ISSN 1823-8343; ESSN: 2289-750X http://einspem.upm.edu.my/journal/fullpaper/vol11saugust/121-138.pdf |
| spellingShingle | Shehu, Sadiq Kamel Ariffin, Muhammad Rezal New attacks on prime power N = prq using good approximation of φ(N) |
| title | New attacks on prime power N = prq using good approximation of φ(N) |
| title_full | New attacks on prime power N = prq using good approximation of φ(N) |
| title_fullStr | New attacks on prime power N = prq using good approximation of φ(N) |
| title_full_unstemmed | New attacks on prime power N = prq using good approximation of φ(N) |
| title_short | New attacks on prime power N = prq using good approximation of φ(N) |
| title_sort | new attacks on prime power n = prq using good approximation of φ(n) |
| url | http://psasir.upm.edu.my/id/eprint/58180/ http://psasir.upm.edu.my/id/eprint/58180/ http://psasir.upm.edu.my/id/eprint/58180/1/121-138.pdf |