New attacks on prime power N = prq using good approximation of φ(N)
This paper proposes three new attacks. Our first attack is based on the RSA key equation ed − kφ(N) = 1 where φ(N) = pr-1(p-1)(q-1). Let q <p <2q and 2p 3r+2/r+1 |p r-1/r+1 – q r-1/r+1| < 1/6Ny with d = Nδ. If δ < 1-y/2 we shows that k/d can be recovered among the convergents of the cont...
| Main Authors: | Shehu, Sadiq, Kamel Ariffin, Muhammad Rezal |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute for Mathematical Research, Universiti Putra Malaysia
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/58180/ http://psasir.upm.edu.my/id/eprint/58180/1/121-138.pdf |
Similar Items
New directions in factoring the prime power RSA modulus N = prq
by: Shehu, Sadiq, et al.
Published: (2016)
by: Shehu, Sadiq, et al.
Published: (2016)
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
A new attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
A new LSB attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
An attack on N = p2q with partially known bits on the multiple of the prime factors
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
by: Abubakar, Saidu Isah
Published: (2018)
by: Abubakar, Saidu Isah
Published: (2018)
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
A new simultaneous diophantine attack upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2018)
by: Abubakar, Saidu Isah, et al.
Published: (2018)
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019)
by: Abubakar, Saidu Isah, et al.
Published: (2019)
Constructing the prime orbit theorem for the beta transformation
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
Determination of a good indicator for estimated prime factor and its modification in Fermat’s Factoring Algorithm
by: Mohd Tahir, Rasyid Redha, et al.
Published: (2021)
by: Mohd Tahir, Rasyid Redha, et al.
Published: (2021)
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
Symmetric n-derivations on prime ideals with applications
by: Ali, Shakir, et al.
Published: (2023)
by: Ali, Shakir, et al.
Published: (2023)
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
On (unknowingly) using near-square RSA primes
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Conditions for counter measure against one time pad attack on Baptista type cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
PLL-based 3φ inverter circuit for microgrid system operated by electrostatic generator
by: Rahman, Tawfikur, et al.
Published: (2019)
by: Rahman, Tawfikur, et al.
Published: (2019)
Commuting graphs, C(G, X) in symmetric groups Sym(n) and its connectivity
by: Nawawi @ Mohamed Nawawi, Athirah, et al.
Published: (2019)
by: Nawawi @ Mohamed Nawawi, Athirah, et al.
Published: (2019)
Industrial building system : does it good for sustainable building? / S. Roshanfekr, N. M Tawil and N. A. Goh
by: Roshanfekr, S., et al.
Published: (2015)
by: Roshanfekr, S., et al.
Published: (2015)
Optimal spectral approximation of 2n-order differential operators by mixed isogeometric analysis
by: Deng, Quanling, et al.
Published: (2019)
by: Deng, Quanling, et al.
Published: (2019)
Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Partial key attack given MSBs of CRT-RSA private keys
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
Development of bacteriophage ΦKAZ14 loaded chitosan nanoparticles for biological control of colibacillosis in chickens
by: Kaikabo, Adamu Ahmad
Published: (2016)
by: Kaikabo, Adamu Ahmad
Published: (2016)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
Evaluation of a lytic bacteriophage, Φ st1, for biocontrol of Salmonella enterica serovar Typhimurium in chickens
by: Wong, Chuan Loo, et al.
Published: (2014)
by: Wong, Chuan Loo, et al.
Published: (2014)
Chitosan nanoparticles as carriers for the delivery of ΦKAZ14 bacteriophage for oral biological control of colibacillosis in chickens
by: Kaikabo, Adamu Ahmad, et al.
Published: (2016)
by: Kaikabo, Adamu Ahmad, et al.
Published: (2016)
Studies of N,N-Dibutyltrimethylenediamine and N, N,N'Triethylenediamine for CO2 absorption and desorption
by: Mohd Akhir, Ammar, et al.
Published: (2008)
by: Mohd Akhir, Ammar, et al.
Published: (2008)
Exponential increment of RSA attack range via lattice based cryptanalysis
by: Nitaj, Abderahmanne, et al.
Published: (2021)
by: Nitaj, Abderahmanne, et al.
Published: (2021)
The existence of ϒ-fixed point for the multidimensional nonlinear mappings satisfying (ψ, θ, ϕ)-weak contractive conditions
by: Akhadkulov, Habibulla, et al.
Published: (2017)
by: Akhadkulov, Habibulla, et al.
Published: (2017)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Similar Items
-
New directions in factoring the prime power RSA modulus N = prq
by: Shehu, Sadiq, et al.
Published: (2016) -
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016) -
New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018) -
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019) -
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)