Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
2.3.7 Small Decryption Exponent Attack . . . . . . . . . . . . . . 25<br />
2.4 Lattice and LLL Algorithm . . . . . . . . . . . . . . . . . . . . . . 27<br />
2.5 Solving Modular Polynomials . . . . . . . . . . . . . . . . . . . . . 31<br />
2.5.1 Coppersmith’s Method . . . . . . . . . . . . . . . . . . . . . 32<br />
2.5.2 General Method by Jochemsz and May . . . . . . . . . . . . 35<br />
2.6 Solving Integer Polynomials . . . . . . . . . . . . . . . . . . . . . . 38<br />
2.6.1 Coron’s Method . . . . . . . . . . . . . . . . . . . . . . . . . 38<br />
2.6.2 General Method by Jochemsz and May . . . . . . . . . . . . 40<br />
2.7 Analysis <strong>of</strong> the Root Finding Techniques . . . . . . . . . . . . . . . 43<br />
2.7.1 Time Complexity Analysis . . . . . . . . . . . . . . . . . . . 43<br />
2.8 Experimental Framework . . . . . . . . . . . . . . . . . . . . . . . . 44<br />
2.9 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45<br />
3 A class <strong>of</strong> Weak Encryption Exponents in <strong>RSA</strong> 47<br />
3.1 Our Basic Technique . . . . . . . . . . . . . . . . . . . . . . . . . . 48<br />
3.2 Improvements over Existing Work . . . . . . . . . . . . . . . . . . . 52<br />
3.2.1 The Improvement in the Bounds <strong>of</strong> X,Y . . . . . . . . . . . 52<br />
3.2.2 Further Improvement in the Bounds . . . . . . . . . . . . . 53<br />
3.2.3 Experimental Results . . . . . . . . . . . . . . . . . . . . . . 53<br />
3.3 A New Class <strong>of</strong> Weak Keys . . . . . . . . . . . . . . . . . . . . . . 55<br />
3.3.1 Experimental Results . . . . . . . . . . . . . . . . . . . . . . 56<br />
3.3.2 Estimation <strong>of</strong> Weak Keys . . . . . . . . . . . . . . . . . . . 59<br />
3.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62<br />
4 <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RSA</strong> with more than one Decryption Exponent 63<br />
4.1 Theoretical Result . . . . . . . . . . . . . . . . . . . . . . . . . . . 64<br />
4.2 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 72<br />
4.3 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73<br />
viii