Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
117 7.1 Finding q −1 mod p ≡ <strong>Factorization</strong> <strong>of</strong> N<br />
b whose norm ||b|| satisfies ||b|| ≤ 2 ω−1<br />
4 (det(L)) 1 ω. The vector b is the coefficient<br />
vector <strong>of</strong> the polynomial h(xX) with ||h(xX)|| = ||b||, where h(x) is the integer<br />
linear combination <strong>of</strong> the polynomials g ij (x). Hence h(−x 0 ) ≡ 0 (mod p 2m ). To<br />
apply Lemma 2.20 and Lemma 2.22 for finding the integer root <strong>of</strong> h(x), we need<br />
2 ω−1<br />
4 (det(L)) 1 ω <<br />
p 2m<br />
√ ω<br />
. (7.3)<br />
Note that ω is the dimension <strong>of</strong> the lattice which we may consider as small<br />
constant with respect to the size <strong>of</strong> p and the elements <strong>of</strong> L. Thus, neglecting 2 ω−1<br />
4<br />
and √ ω, we can rewrite (7.3) as det(L) < p 2mω . Substituting the expression <strong>of</strong><br />
det(L) from Equation (7.2) and using X = N β ,p ≈ N γ we get<br />
(m+t)(m+t+1)<br />
β +m(m+1) < 2m(m+t+1)γ. (7.4)<br />
2<br />
Let t = τm. Then neglecting the terms <strong>of</strong> o(m 2 ) we can rewrite (7.4) as<br />
τ 2 β<br />
2 +(β −2γ)τ + β 2<br />
−2γ +1 < 0. (7.5)<br />
Now, the optimal value <strong>of</strong> τ to minimize the left hand side <strong>of</strong> (7.5) is 2γ−β<br />
β . Putting<br />
this optimal value in (7.5), we get β −2γ 2 < 0.<br />
Our strategy uses LLL algorithm [77] to find h(x) and then calculates the<br />
integer root <strong>of</strong> h(x). Both these steps are deterministic polynomial time in logN.<br />
Thus the result.<br />
Corollary 7.2. Factoring N is deterministic polynomial time equivalent to finding<br />
q −1 mod p, where N = pq and p > q.<br />
Pro<strong>of</strong>. When no approximation <strong>of</strong> p is given, then β in the Theorem 7.1 is equal<br />
to γ. Putting β = γ in the condition β−2γ 2 < 0, we get γ > 1 . This requirement<br />
2<br />
forces the condition that p > q. Also, it is trivial to note that if the factorization<br />
<strong>of</strong> N is known then one can efficiently compute q −1 mod p. Thus the pro<strong>of</strong>.<br />
Corollary 7.3. Factoring N is deterministic polynomial time equivalent to finding<br />
q −1 mod p, where N = pq and p,q are <strong>of</strong> same bit size.<br />
Pro<strong>of</strong>. The pro<strong>of</strong> <strong>of</strong> the case p > q is already taken care in Corollary 7.2. Now<br />
consider q > p. When p,q are <strong>of</strong> same bit size and p < q, then p < q < 2p, i.e.,