New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
This paper proposes new vulnerability in m moduli of the form Ni = p2iqi for m ≥ 2 and i = 1, ...,m. The attack works when m public keys (Ni, ei) there exist m relations of the form eid − kΦ (Ni) = 1 or eidi − kiΦ (Ni) = 1 with the parameters d, di, k and ki are suitably small. By using the term N −...
| Main Authors: | Nek Abd Rahman, Normahirah, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf, Yunos, Faridah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Institute for Mathematical Research, Universiti Putra Malaysia
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/66552/ http://psasir.upm.edu.my/id/eprint/66552/1/Cryptology2018-7.pdf |
Similar Items
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
New attacks on prime power N = prq using good approximation of φ(N)
by: Shehu, Sadiq, et al.
Published: (2017)
by: Shehu, Sadiq, et al.
Published: (2017)
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019)
by: Abubakar, Saidu Isah, et al.
Published: (2019)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Design and analysis of Rabin-p key encapsulation mechanism for CyberSecurity Malaysia MySEAL initiative
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
A new simultaneous diophantine attack upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2018)
by: Abubakar, Saidu Isah, et al.
Published: (2018)
Determination of a good indicator for estimated prime factor and its modification in Fermat’s Factoring Algorithm
by: Mohd Tahir, Rasyid Redha, et al.
Published: (2021)
by: Mohd Tahir, Rasyid Redha, et al.
Published: (2021)
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Alternative method to find the number of points on Koblitz curve
by: Hadani, Nurul Hafizah, et al.
Published: (2019)
by: Hadani, Nurul Hafizah, et al.
Published: (2019)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
A proposed CCA-secure encryption on an ElGamal variant
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Design of Rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Another proof of wiener's short secret exponent
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
PLL-based 3φ inverter circuit for microgrid system operated by electrostatic generator
by: Rahman, Tawfikur, et al.
Published: (2019)
by: Rahman, Tawfikur, et al.
Published: (2019)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
Enhanced AAβ cryptosystem - a comparative analysis
by: Mahad, Zahari, et al.
Published: (2019)
by: Mahad, Zahari, et al.
Published: (2019)
Enhanced AAβ cryptosystem: the design
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
On some specific patterns of τ-Adic non-adjacent form expansion over ring Z (τ)
by: Yunos, Faridah, et al.
Published: (2019)
by: Yunos, Faridah, et al.
Published: (2019)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
Development of bacteriophage ΦKAZ14 loaded chitosan nanoparticles for biological control of colibacillosis in chickens
by: Kaikabo, Adamu Ahmad
Published: (2016)
by: Kaikabo, Adamu Ahmad
Published: (2016)
Evaluation of a lytic bacteriophage, Φ st1, for biocontrol of Salmonella enterica serovar Typhimurium in chickens
by: Wong, Chuan Loo, et al.
Published: (2014)
by: Wong, Chuan Loo, et al.
Published: (2014)
Similar Items
-
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024) -
New attacks on prime power N = prq using good approximation of φ(N)
by: Shehu, Sadiq, et al.
Published: (2017) -
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016) -
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017) -
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)