Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy
This paper presents a cryptanalytic approach on the variants of the RSA which utilizes the modulus N = p2q where p and q are balanced large primes. Suppose satisfying gcd(e, ϕ(N)) = 1 where ϕ(N) = p(p − 1)(q − 1) and d < Nδ be its multiplicative inverse. From ed − kϕ(N) = 1, by utilizing the ext...
| Main Authors: | Adenan, Nurul Nur Hanisah, Kamel Ariffin, Muhammad Rezal, Yunos, Faridah, Sapar, Siti Hasana, Asbullah, Muhammad Asyraf |
|---|---|
| Format: | Article |
| Published: |
Public Library of Science
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/95804/ |
Similar Items
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Extending jochemsz-may analytical strategies upon integer factorization problem
by: Adenan, Nurul Nur Hanisah
Published: (2021)
by: Adenan, Nurul Nur Hanisah
Published: (2021)
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
An updated cryptanalysis on the BFHP-DLP signing scheme
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2022)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2022)
Exponential increment of RSA attack range via lattice based cryptanalysis
by: Nitaj, Abderahmanne, et al.
Published: (2021)
by: Nitaj, Abderahmanne, et al.
Published: (2021)
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019)
by: Abubakar, Saidu Isah, et al.
Published: (2019)
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
A new simultaneous diophantine attack upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2018)
by: Abubakar, Saidu Isah, et al.
Published: (2018)
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)
by: Lau, Terry Shue Chien, et al.
Published: (2024)
The Blömer-May’s weak key revisited
by: Mohd Tahir, Rasyid Redha, et al.
Published: (2019)
by: Mohd Tahir, Rasyid Redha, et al.
Published: (2019)
Factoring the modulus of type n = p2q by finding small solutions of the equation er − (ns + t) = αp2 + βq2
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2021)
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2013)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Fast decryption method for a Rabin primitive-based cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
A proposed CCA-secure encryption on an ElGamal variant
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Design of Rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Another proof of wiener's short secret exponent
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
Analysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
New vulnerability on system of Ni = p²iqi using good approximation of Φ(N)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2018)
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Alternative method to find the number of points on Koblitz curve
by: Hadani, Nurul Hafizah, et al.
Published: (2019)
by: Hadani, Nurul Hafizah, et al.
Published: (2019)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
An attack on N = p2q with partially known bits on the multiple of the prime factors
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
Similar Items
-
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021) -
Extending jochemsz-may analytical strategies upon integer factorization problem
by: Adenan, Nurul Nur Hanisah
Published: (2021) -
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017) -
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014) -
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)