DocumentCode :
1519998
Title :
Cryptanalysis of short RSA secret exponents
Author :
Wiener, Michael J.
Author_Institution :
Bell-Northern Res. Ltd., Ottawa, Ont., Canada
Volume :
36
Issue :
3
fYear :
1990
fDate :
5/1/1990 12:00:00 AM
Firstpage :
553
Lastpage :
558
Abstract :
A cryptanalytic attack on the use of short RSA secret exponents is described. The attack makes use of an algorithm based on continued fractions that finds the numerator and denominator of a fraction in polynomial time when a close enough estimate of the fraction is known. The public exponent e and the modulus pq can be used to create an estimate of a fraction that involves the secret exponent d. The algorithm based on continued fractions uses this estimate to discover sufficiently short secret exponents. For a typical case where e>pq, GCD(p-1, q -1) is small, and p and q have approximately the same number of bits, this attack will discover secret exponents with up to approximately one-quarter as may bits as the modulus. Ways to combat this attack, ways to improve it, and two open problems are described. This attack poses no threat to the normal case of RSA where the secret exponent is approximately the same size as the modulus. This is because the attack uses information provided by the public exponent and, in the normal case, the public exponent can be chosen almost independently of the modulus
Keywords :
cryptography; continued fractions; cryptanalytic attack; cryptosystems; modulus; polynomial time; public exponent; short RSA secret exponents; Broadcasting; Cryptography; Polynomials; Read only memory; Smart cards;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/18.54902
Filename :
54902
Link To Document :
بازگشت