11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5: Reconstruction <strong>of</strong> Primes given few <strong>of</strong> its Bits 86<br />

from g i,j and h i,j respectively. Thus, one can calculate<br />

det(L) =<br />

[ m<br />

∏<br />

m−j<br />

∏<br />

j=0 i=0<br />

X i+j Y j T m−j ][ m<br />

∏<br />

m−j<br />

∏<br />

j=0 i=1<br />

X j Y i+j T m−j ]<br />

= X s 1<br />

Y s 2<br />

T s 3<br />

where s 1 = 1 2 m3 +m 2 + 1 2 m, s 2 = 1 2 m3 +m 2 + 1 2 m, and s 3 = 2 3 m3 + 3 2 m2 + 5 6 m.<br />

To utilize resultant techniques and Assumption 1, we need two polynomials<br />

f 1 (x,y), f 2 (x,y) which share the root (p 1 ,q 1 ) over integers. From Theorem 2.23,<br />

we know that one can find such f 1 (x,y),f 2 (x,y) using LLL lattice reduction algorithm<br />

[77] over L when det(L) < T mω , neglecting the small constants. Given<br />

det(L) and ω as above, the condition becomes X s 1<br />

Y s 2<br />

T s 3<br />

< T m((m+1)2) , i.e.,<br />

X s 1<br />

Y s 2<br />

< T s 0<br />

, where s 0 = m((m+1) 2 )−s 3 = 1 3 m3 + 1 2 m2 + 1 m. Putting the values<br />

<strong>of</strong> the bounds X = Y = 2 τl N<br />

6<br />

, and neglecting o(m 3 ) terms, we get τ + τ < τ+η<br />

2 2 3<br />

and thus get the required bound for τ. Now, one can find the root (p 1 ,q 1 ) from<br />

f 1 ,f 2 under Assumption 1.<br />

This lattice based technique complements Algorithm 7 by overcoming one <strong>of</strong><br />

its limitations. As we discussed before, the search tree grows two-folds each time<br />

we do not have any information about the bits <strong>of</strong> the primes. Hence in a case<br />

where an initial chunk <strong>of</strong> LSBs is unknown for both the primes, one can not use<br />

Algorithm7forreconstructionasitwouldrequirehugestoragespaceforthesearch<br />

tree. This lattice based technique provides a feasible solution in such a case. We<br />

present a few experimental results in Table 5.2 to illustrate the operation <strong>of</strong> this<br />

technique.<br />

# <strong>of</strong> Unknown # <strong>of</strong> Known Time in Seconds<br />

bits (τl N ) bits (ηl N ) LLL Algorithm Resultant Root Extraction<br />

40 90 36.66 25.67 < 1<br />

50 110 47.31 35.20 < 1<br />

60 135 69.23 47.14 < 1<br />

70 155 73.15 58.04 < 1<br />

Table 5.2: Experimental runs <strong>of</strong> the Lattice Based Technique with dimension 64.<br />

The limitation <strong>of</strong> this technique is that it asks for double or more the number<br />

<strong>of</strong> missing bits for both the primes. If one misses 60 LSBs for the primes say,<br />

this method requires the next 120 or more bits <strong>of</strong> both the primes to be known to<br />

reconstruct all 60 + 120 = 180 LSBs. In the practical scenario, the requirement

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!