Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 5: Reconstruction <strong>of</strong> Primes given few <strong>of</strong> its Bits 86<br />
from g i,j and h i,j respectively. Thus, one can calculate<br />
det(L) =<br />
[ m<br />
∏<br />
m−j<br />
∏<br />
j=0 i=0<br />
X i+j Y j T m−j ][ m<br />
∏<br />
m−j<br />
∏<br />
j=0 i=1<br />
X j Y i+j T m−j ]<br />
= X s 1<br />
Y s 2<br />
T s 3<br />
where s 1 = 1 2 m3 +m 2 + 1 2 m, s 2 = 1 2 m3 +m 2 + 1 2 m, and s 3 = 2 3 m3 + 3 2 m2 + 5 6 m.<br />
To utilize resultant techniques and Assumption 1, we need two polynomials<br />
f 1 (x,y), f 2 (x,y) which share the root (p 1 ,q 1 ) over integers. From Theorem 2.23,<br />
we know that one can find such f 1 (x,y),f 2 (x,y) using LLL lattice reduction algorithm<br />
[77] over L when det(L) < T mω , neglecting the small constants. Given<br />
det(L) and ω as above, the condition becomes X s 1<br />
Y s 2<br />
T s 3<br />
< T m((m+1)2) , i.e.,<br />
X s 1<br />
Y s 2<br />
< T s 0<br />
, where s 0 = m((m+1) 2 )−s 3 = 1 3 m3 + 1 2 m2 + 1 m. Putting the values<br />
<strong>of</strong> the bounds X = Y = 2 τl N<br />
6<br />
, and neglecting o(m 3 ) terms, we get τ + τ < τ+η<br />
2 2 3<br />
and thus get the required bound for τ. Now, one can find the root (p 1 ,q 1 ) from<br />
f 1 ,f 2 under Assumption 1.<br />
This lattice based technique complements Algorithm 7 by overcoming one <strong>of</strong><br />
its limitations. As we discussed before, the search tree grows two-folds each time<br />
we do not have any information about the bits <strong>of</strong> the primes. Hence in a case<br />
where an initial chunk <strong>of</strong> LSBs is unknown for both the primes, one can not use<br />
Algorithm7forreconstructionasitwouldrequirehugestoragespaceforthesearch<br />
tree. This lattice based technique provides a feasible solution in such a case. We<br />
present a few experimental results in Table 5.2 to illustrate the operation <strong>of</strong> this<br />
technique.<br />
# <strong>of</strong> Unknown # <strong>of</strong> Known Time in Seconds<br />
bits (τl N ) bits (ηl N ) LLL Algorithm Resultant Root Extraction<br />
40 90 36.66 25.67 < 1<br />
50 110 47.31 35.20 < 1<br />
60 135 69.23 47.14 < 1<br />
70 155 73.15 58.04 < 1<br />
Table 5.2: Experimental runs <strong>of</strong> the Lattice Based Technique with dimension 64.<br />
The limitation <strong>of</strong> this technique is that it asks for double or more the number<br />
<strong>of</strong> missing bits for both the primes. If one misses 60 LSBs for the primes say,<br />
this method requires the next 120 or more bits <strong>of</strong> both the primes to be known to<br />
reconstruct all 60 + 120 = 180 LSBs. In the practical scenario, the requirement