An attack on N = p2q with partially known bits on the multiple of the prime factors
This paper presents a cryptanalytic study upon the modulus N = p 2q consisting of two large primes that are in the same-bit size. In this work, we show that the modulus N is factorable if e satisfies the Diophantine equation of the form ed − k(N − (ap)2 − apbq + ap) = 1 where ab is an unknown appro...
| Main Authors: | Wan Mohd Ruzai, Wan Nur Aqlili, Adenan, Nurul Nur Hanisah, Kamel Ariffin, Muhammad Rezal, Abd Ghafar, Amir Hamzah, Mohamat Johari, Mohamat Aidil |
|---|---|
| Format: | Article |
| Published: |
Universiti Putra Malaysia
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/95820/ |
Similar Items
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
On (unknowingly) using near-square RSA primes
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
A new attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
A new LSB attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)
New attacks on prime power N = prq using good approximation of φ(N)
by: Shehu, Sadiq, et al.
Published: (2017)
by: Shehu, Sadiq, et al.
Published: (2017)
Extended bounds of beatty sequence associated with primes
by: Deraman, Fatanah, et al.
Published: (2019)
by: Deraman, Fatanah, et al.
Published: (2019)
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Partial key attack given MSBs of CRT-RSA private keys
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
by: Abd Ghafar, Amir Hamzah Abd, et al.
Published: (2020)
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019)
Another look at the security analysis of the modulus N = p 2 q by utilizing an approximation approach for ϕ(N)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
by: Aqlili Ruzai, Wan Nur, et al.
Published: (2024)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
Constructing the prime orbit theorem for the beta transformation
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
General relation between sums of figurate numbers
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
by: Mohamat Johari, Mohamat Aidil
Published: (2013)
Exponential increment of RSA attack range via lattice based cryptanalysis
by: Nitaj, Abderahmanne, et al.
Published: (2021)
by: Nitaj, Abderahmanne, et al.
Published: (2021)
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022)
by: Boon, Chian Tea, et al.
Published: (2022)
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018)
by: Wen, Chuah Chai, et al.
Published: (2018)
SPA on Rabin variant with public key N= p2q
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2016)
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
Ergodicity of power series-maps on the simplexes of group algebras of finite groups
by: Bekbaev, Ural, et al.
Published: (2017)
by: Bekbaev, Ural, et al.
Published: (2017)
New directions in factoring the prime power RSA modulus N = prq
by: Shehu, Sadiq, et al.
Published: (2016)
by: Shehu, Sadiq, et al.
Published: (2016)
Relation between sum of 2mth powers and polynomials of triangular numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2014)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2014)
Relation between square and centered pentagonal numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2012)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2012)
A combinatorial proof for a relation between certain types of integers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2013)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2013)
A general relation between sums of cubes and triangular pyramidal numbers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2011)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2011)
A robust security framework with bit-flipping attack and timing attack for key derivation functions
by: Wen Koh, Wen, et al.
Published: (2020)
by: Wen Koh, Wen, et al.
Published: (2020)
Predictor-corrector scheme for solving second order ordinary differential equations
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2022)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2022)
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
Concurrent factorization of RSA moduli via weak key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Genome comparison of Actinomyces naeslundii with known probiotics
by: Wan Mohd Kamaluddin, Wan Nur Fatihah, et al.
Published: (2019)
by: Wan Mohd Kamaluddin, Wan Nur Fatihah, et al.
Published: (2019)
Stochastic stability analysis of periodic uncertain markov jump systems with partially known information
by: Zhu, L., et al.
Published: (2017)
by: Zhu, L., et al.
Published: (2017)
On the cardinality of twelfth degree polynomial
by: Lasaraiya, Suriana, et al.
Published: (2016)
by: Lasaraiya, Suriana, et al.
Published: (2016)
Cardinality of sets associated to certain degree seven polynomials
by: Lasaraiya, Suriana, et al.
Published: (2015)
by: Lasaraiya, Suriana, et al.
Published: (2015)
On the cardinality of the set of solutions to congruence equation associated with polynomial of degree eleven
by: Lasaraiya, Suriana, et al.
Published: (2015)
by: Lasaraiya, Suriana, et al.
Published: (2015)
The Holocene history of the North American Monsoon: 'known knowns' and 'known unknowns' in understanding its spatial and temporal complexity
by: Metcalfe, Sarah E., et al.
Published: (2015)
by: Metcalfe, Sarah E., et al.
Published: (2015)
Similar Items
-
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019) -
On (unknowingly) using near-square RSA primes
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022) -
A new attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019) -
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024) -
A new LSB attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2020)