New weak findings upon RSA modulo of type N = p2 q

This paper proposes new attacks on RSA with the modulus N = p2 q. The first attack is based on the equation eX −NY = p2 u+q2 v +Z such that u is an integer multiple of 2 and v is an integer multiple of 3. If |p2 u − q2 v| < N1/2, |Z| ■(|p^2 - q^2 | @3(p^2 + q^2)) < N1/3 and X < ▁((...

Full description

Saved in:
Bibliographic Details
Main Authors: Kamel Ariffin, Muhammad Rezal, Nek Abd Rahman, Normahirah
Format: Article
Language:English
Published: Research India Publications 2016
Online Access:http://psasir.upm.edu.my/id/eprint/53380/1/New%20weak%20findings%20upon%20RSA%20.pdf
http://psasir.upm.edu.my/id/eprint/53380/
http://www.ripublication.com/Volume/gjpamv12n4.htm
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Putra Malaysia
Language: English
id my.upm.eprints.53380
record_format eprints
spelling my.upm.eprints.533802022-03-18T07:18:31Z http://psasir.upm.edu.my/id/eprint/53380/ New weak findings upon RSA modulo of type N = p2 q Kamel Ariffin, Muhammad Rezal Nek Abd Rahman, Normahirah This paper proposes new attacks on RSA with the modulus N = p2 q. The first attack is based on the equation eX −NY = p2 u+q2 v +Z such that u is an integer multiple of 2 and v is an integer multiple of 3. If |p2 u − q2 v| < N1/2, |Z| ■(|p^2 - q^2 | @3(p^2 + q^2)) < N1/3 and X < ▁((■(N@3(p^2 u + q^2 v))) ̅ ) then N can be factored in polynomial time using continued fractions. For the second and third attacks, this paper proposes new vulnerabilities in k RSA Moduli Ni = p_i^2 qi for k ≥ 2 and i = 1,...,k. The attacks work when k RSA public keys (Ni, ei) are related through eix − Niyi = p_i^2 u + q_i^2 v + zi or eixi − Niy = p_i^2 u + q_i^2 v + zi where the parameters x, xi, y, yi and zi are suitably small. Research India Publications 2016 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/53380/1/New%20weak%20findings%20upon%20RSA%20.pdf Kamel Ariffin, Muhammad Rezal and Nek Abd Rahman, Normahirah (2016) New weak findings upon RSA modulo of type N = p2 q. Global Journal of Pure and Applied Mathematics, 12 (4). pp. 3159-3185. ISSN 0973-1768; ESSN: 0973-9750 http://www.ripublication.com/Volume/gjpamv12n4.htm
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description This paper proposes new attacks on RSA with the modulus N = p2 q. The first attack is based on the equation eX −NY = p2 u+q2 v +Z such that u is an integer multiple of 2 and v is an integer multiple of 3. If |p2 u − q2 v| < N1/2, |Z| ■(|p^2 - q^2 | @3(p^2 + q^2)) < N1/3 and X < ▁((■(N@3(p^2 u + q^2 v))) ̅ ) then N can be factored in polynomial time using continued fractions. For the second and third attacks, this paper proposes new vulnerabilities in k RSA Moduli Ni = p_i^2 qi for k ≥ 2 and i = 1,...,k. The attacks work when k RSA public keys (Ni, ei) are related through eix − Niyi = p_i^2 u + q_i^2 v + zi or eixi − Niy = p_i^2 u + q_i^2 v + zi where the parameters x, xi, y, yi and zi are suitably small.
format Article
author Kamel Ariffin, Muhammad Rezal
Nek Abd Rahman, Normahirah
spellingShingle Kamel Ariffin, Muhammad Rezal
Nek Abd Rahman, Normahirah
New weak findings upon RSA modulo of type N = p2 q
author_facet Kamel Ariffin, Muhammad Rezal
Nek Abd Rahman, Normahirah
author_sort Kamel Ariffin, Muhammad Rezal
title New weak findings upon RSA modulo of type N = p2 q
title_short New weak findings upon RSA modulo of type N = p2 q
title_full New weak findings upon RSA modulo of type N = p2 q
title_fullStr New weak findings upon RSA modulo of type N = p2 q
title_full_unstemmed New weak findings upon RSA modulo of type N = p2 q
title_sort new weak findings upon rsa modulo of type n = p2 q
publisher Research India Publications
publishDate 2016
url http://psasir.upm.edu.my/id/eprint/53380/1/New%20weak%20findings%20upon%20RSA%20.pdf
http://psasir.upm.edu.my/id/eprint/53380/
http://www.ripublication.com/Volume/gjpamv12n4.htm
_version_ 1728052810200645632