PKC2016@Taipei How to Generalize RSA Cryptanalyses Atsushi Takayasu and Noboru Kunihiro The University of Tokyo, Japan AIST, Japan 1/19
Background 2 /19
RSA Public key: π, π Secret key: (π, π, π) Key generation: π = ππ and ππ = 1 mod (π β 1)(π β 1) οΌ One of the most famous cryptosystems οΌ A number of paper study the security. 3 /19
Known Attacks on RSA β’ Small secret exponent attack: [BD00] Small secret exponent π < π 0.292 disclose the factorization of π . β’ Partial key exposure attacks: [EJMW05], [TK14] The most/least significant bits of π disclose the factorization of π . οΌ These attacks are based on Coppersmithβs method. 4 /19
Variants of RSA RSA Takagi RSA Prime Power RSA π, π π, π π, π PK (π, π, π) (π, π, π) (π, π, π) SK π = π π π π = π π π π = ππ KG ππ = 1 ππ = 1 ππ = 1 mod mod mod π π β1 (π β 1)(π β 1) (π β 1)(π β 1) (π β 1)(π β 1) οΌ The variants enable faster decryption using CRT. οΌ When π = 1 , both variants are the same as RSA. 5 /19
Known Attacks on the Variants RSA Takagiβs RSA Prime Power RSA Small [BD00] [IKK08] [May04], [LZPL15], Secret [Sar15] Exponent Partial [EJMW05], [HHX+14] [May04], [LZPL15], Key [TK14] [Sar15], [EKU15] Exposure οΌ When π = 1 , only [IKK08] achieves the same bound as the best attacks on RSA. 6 /19
Open Questions β’ Are there better attacks on the variants that generalize the best attacks on RSA? β’ [IKK08]βs algorithm construction is very technical and hard to follow. 7 /19
Open Questions β’ Are there better attacks on the variants that generalize the best attacks on RSA? β’ [IKK08]βs algorithm construction is very technical and hard to follow. Are there easy-to-understand generic transformations that convert the attacks on RSA to Takagiβs RSA and the prime power RSA? 7 /19
Our Results We propose transformations for both the Takagiβs RSA and the prime power RSA which are very simple and give improved results. β Simpler analyses of [IKK08], [Sar15] β Better bounds than [HHX+14], [Sar15], [EKU15] β Some evidence of optimality 8 /19
PKE attacks on Takagiβs RSA (π = 2) Exposed proportion of π [HHX+14] Our Improvements log π π 9 /19
PKE attacks on Takagiβs RSA (π = 2) Exposed proportion of π [HHX+14] Our Improvements log π π 9 /19
PKE attacks on the prime power RSA (π = 2) Exposed proportion of π [LZPL15] [Sar15] Our Improvements log π π 9 /19
Coppersmithβs Method 10 /19
Overview [How97] To find small roots of a bivariate modular equation β π¦, π§ = 0 mod π where π¦ < π and π§ < Y, 11 /19
Overview [How97] To find small roots of a bivariate modular equation β π¦, π§ = 0 mod π where π¦ < π and π§ < Y, β’ Generate β 1 π¦, π§ , β¦ , β π (π¦, π§) that have the roots ) modulo π π . (π¦ , π§ 11 /19
Overview [How97] To find small roots of a bivariate modular equation β π¦, π§ = 0 mod π where π¦ < π and π§ < Y, β’ Generate β 1 π¦, π§ , β¦ , β π (π¦, π§) that have the roots ) modulo π π . (π¦ , π§ β’ If integer linear combinations of β 1 π¦, π§ , β¦ , β π (π¦, π§) β² π¦, π§ and β 2 β² (π¦, π§) satisfying become β 1 < π π , β π β²(π¦π, π§π) the original roots can be recovered. 11 /19
LLL Reduction to Find the Polynomials β² π¦, π§ and β 2 β² (π¦, π§) that are the integer β’ Polynomials β 1 linear combinations of β 1 π¦, π§ , β¦ , β π (π¦, π§) and the norms of β π β²(π¦π, π§π) are small. 12 /19
LLL Reduction to Find the Polynomials β² π¦, π§ and β 2 β² (π¦, π§) that are the integer β’ Polynomials β 1 linear combinations of β 1 π¦, π§ , β¦ , β π (π¦, π§) and the norms of β π β²(π¦π, π§π) are small. β’ LLL algorithm can efficiently find short lattice vectors π 1 β² and π 2 β² that are the integer linear combinations of π 1 , β¦, π π and the Euclidean norms are small. 12 /19
LLL Reduction to Find the Polynomials β² π¦, π§ and β 2 β² (π¦, π§) that are the integer β’ Polynomials β 1 linear combinations of β 1 π¦, π§ , β¦ , β π (π¦, π§) and the norms of β π β²(π¦π, π§π) are small. β’ LLL algorithm can efficiently find short lattice vectors π 1 β² and π 2 β² that are the integer linear combinations of π 1 , β¦, π π and the Euclidean norms are small. οΌ Build a lattice whose basis consists of coefficients of β 1 π¦π, π§π , β¦ , β π (π¦π, π§π) and apply the LLL. 12 /19
SSE Attack on RSA [BD00] π = ππ and ππ = 1 mod (π β 1)(π β 1) π π¦, π§ = 1 + π¦ π + 1 + π§ mod π whose root (β, β π + π ) discloses the factorization of π . β’ A bivariate equation with three monomials ( 1, π¦, π¦π§ ) 13 /19
SSE Attack on RSA [BD00] π = ππ and ππ = 1 mod (π β 1)(π β 1) π π¦, π§ = 1 + π¦ π + 1 + π§ mod π whose root (β, β π + π ) discloses the factorization of π . Polynomials π¦ π π§ π π π£ π¦, π§ π πβπ£ g enerate a triangular matrix with diagonals π π+π£ π π+π£ π πβπ£ . οΌ The resulting lattice constructions are well-analyzed. 13 /19
SSE Attack on RSA [BD00] π = ππ and ππ = 1 mod (π β 1)(π β 1) π π¦, π§ = 1 + π¦ π + 1 + π§ mod π whose root (β, β π + π ) discloses the factorization of π . Polynomials π¦ π π§ π π π£ π¦, π§ π πβπ£ g enerate a triangular matrix with diagonals π π+π£ π π+π£ π πβπ£ . οΌ The resulting lattice constructions are well-analyzed. 13 /19
How to Generalize the Attacks 14 /19
SSE Attack on Takagiβs RSA π = π π π and ππ = 1 mod (π β 1)(π β 1) π π¦, π§ 1 , π§ 2 = 1 + π¦ π§ 1 β 1 (π§ 2 β 1) mod π whose root (β, π, π) discloses the factorization of π . β’ A trivariate equation with five monomials ( 1, π¦, π¦π§ 1 , π¦π§ 2 , π¦π§ 1 π§ 2 ) π π§ 2 = π β’ Nontrivial algebraic relation π§ 1 15 /19
SSE Attack on Takagiβs RSA π = π π π and ππ = 1 mod (π β 1)(π β 1) π π¦, π§ 1 , π§ 2 = 1 + π¦ π§ 1 β 1 (π§ 2 β 1) mod π whose root (β, π, π) discloses the factorization of π . Polynomials π π π£ π¦, π§ 1 , π§ 2 π πβπ£ π β1 π§ 2 β π¦ π π§ 1, π§ 2 , π§ 1 π§ 2 , β¦ , π§ 1 1 g enerate a triangular matrix with (sizes of ) diagonals π 0 , π 1 , β¦ , π π β π π+π£ π π+π£ π πβπ£ . 15 /19
SSE Attack on Takagiβs RSA π = π π π and ππ = 1 mod (π β 1)(π β 1) π π¦, π§ 1 , π§ 2 = 1 + π¦ π§ 1 β 1 (π§ 2 β 1) mod π whose root (β, π, π) discloses the factorization of π . Polynomials π π π£ π¦, π§ 1 , π§ 2 π πβπ£ π β1 π§ 2 β π¦ π π§ 1, π§ 2 , π§ 1 π§ 2 , β¦ , π§ 1 1 g enerate a triangular matrix with (sizes of ) diagonals π 0 , π 1 , β¦ , π π β π π+π£ π π+π£ π πβπ£ . 15 /19
SSE Attack on the prime power RSA π = π π π and ππ = 1 mod (π β 1)(π β 1) π β1 π§ 1 β 1 (π§ 2 β 1) mod π π π¦, π§ 1 , π§ 2 = 1 + π¦π§ 1 whose roots (β, π, π) offer the factorization of π . β’ A trivariate equation with five monomials π β1 , π¦π§ 1 π , π¦π§ 1 π β1 π§ 2 ) ( 1, π¦, π¦π§ 1 π π§ 2 = π β’ Nontrivial algebraic relation π§ 1 16 /19
SSE Attack on the prime power RSA π = π π π and ππ = 1 mod (π β 1)(π β 1) π β1 π§ 1 β 1 (π§ 2 β 1) mod π π π¦, π§ 1 , π§ 2 = 1 + π¦π§ 1 whose roots (β, π, π) offer the factorization of π . Polynomials π , π§ 1 π§ 2 π , β¦ , π§ 1 π β1 π§ 2 π , π§ 1 π β1 π§ 2 π+1 π§ 2 π π π£ π¦, π§ 1 , π§ 2 π πβπ£ β π¦ π π§ 1 g enerate a triangular matrix with (sizes of ) diagonals π π , π π+1 , β¦ , π π+π β π π+π£ π π+π£ π πβπ£ . 16 /19
Our Transformations PKE on RSA SSE on RSA π β1 π§ 2 1, π§ 2 , π§ 1 π§ 2 , β¦ , π§ 1 SSE on Takagi RSA PKE on Takagi RSA 17 /19
Our Transformations PKE on RSA SSE on RSA π+1 π , π§ 1 π§ 2 π , β¦ , π§ 1 π β1 π§ 2 π , π§ 1 π β1 π§ 2 π§ 2 SSE on PKE on prime power RSA prime power RSA 18 /19
Conclusion β’ We propose generic transformations that convert lattices on RSA to those on the Takagi RSA and the prime power RSA. As applications, we propose small secret exponent attacks and partial key exposure attacks on the variants. οΌ Further applications of our transformations? οΌ Better attacks can be obtained from other frameworks? 19 /19
Recommend
More recommend