A new LSB attack on special-structured RSA primes

Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest–Shamir–Adleman (RSA) cryptosystem is highly regarded as one of the most deployed public-key cryptosyst...

Full description

Saved in:
Bibliographic Details
Main Authors: Abd Ghafar, Amir Hamzah, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf
Format: Article
Language:English
Published: MDPI 2020
Online Access:http://psasir.upm.edu.my/id/eprint/36978/1/36978.pdf
http://psasir.upm.edu.my/id/eprint/36978/
https://www.mdpi.com/2073-8994/12/5/838
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.36978
record_format eprints
spelling my.upm.eprints.369782020-06-16T06:38:45Z http://psasir.upm.edu.my/id/eprint/36978/ A new LSB attack on special-structured RSA primes Abd Ghafar, Amir Hamzah Kamel Ariffin, Muhammad Rezal Asbullah, Muhammad Asyraf Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest–Shamir–Adleman (RSA) cryptosystem is highly regarded as one of the most deployed public-key cryptosystem today. Previous attacks on the cryptosystem focus on the effort to weaken the hardness of integer factorization problem, embedded in the RSA modulus, N=pq . The adversary used several assumptions to enable the attacks. For examples, p and q which satisfy Pollard’s weak primes structures and partial knowledge of least significant bits (LSBs) of p and q can cause N to be factored in polynomial time, thus breaking the security of RSA. In this paper, we heavily utilized both assumptions. First, we assume that p and q satisfy specific structures where p=am+rp and q=bm+rq for a,b are positive integers and m is a positive even number. Second, we assume that the bits of rp and rq are the known LSBs of p and q respectively. In our analysis, we have successfully factored N in polynomial time using both assumptions. We also counted the number of primes that are affected by our attack. Based on the result, it may poses a great danger to the users of RSA if no countermeasure being developed to resist our attack. MDPI 2020 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/36978/1/36978.pdf Abd Ghafar, Amir Hamzah and Kamel Ariffin, Muhammad Rezal and Asbullah, Muhammad Asyraf (2020) A new LSB attack on special-structured RSA primes. Symmetry, 12 (5). art. no. 838. pp. 1-13. ISSN 2073-8994 https://www.mdpi.com/2073-8994/12/5/838 10.3390/sym12050838
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest–Shamir–Adleman (RSA) cryptosystem is highly regarded as one of the most deployed public-key cryptosystem today. Previous attacks on the cryptosystem focus on the effort to weaken the hardness of integer factorization problem, embedded in the RSA modulus, N=pq . The adversary used several assumptions to enable the attacks. For examples, p and q which satisfy Pollard’s weak primes structures and partial knowledge of least significant bits (LSBs) of p and q can cause N to be factored in polynomial time, thus breaking the security of RSA. In this paper, we heavily utilized both assumptions. First, we assume that p and q satisfy specific structures where p=am+rp and q=bm+rq for a,b are positive integers and m is a positive even number. Second, we assume that the bits of rp and rq are the known LSBs of p and q respectively. In our analysis, we have successfully factored N in polynomial time using both assumptions. We also counted the number of primes that are affected by our attack. Based on the result, it may poses a great danger to the users of RSA if no countermeasure being developed to resist our attack.
format Article
author Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
spellingShingle Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
A new LSB attack on special-structured RSA primes
author_facet Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
Asbullah, Muhammad Asyraf
author_sort Abd Ghafar, Amir Hamzah
title A new LSB attack on special-structured RSA primes
title_short A new LSB attack on special-structured RSA primes
title_full A new LSB attack on special-structured RSA primes
title_fullStr A new LSB attack on special-structured RSA primes
title_full_unstemmed A new LSB attack on special-structured RSA primes
title_sort new lsb attack on special-structured rsa primes
publisher MDPI
publishDate 2020
url http://psasir.upm.edu.my/id/eprint/36978/1/36978.pdf
http://psasir.upm.edu.my/id/eprint/36978/
https://www.mdpi.com/2073-8994/12/5/838
_version_ 1671341082231701504
score 13.159267