11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

117 7.1 Finding q −1 mod p ≡ <strong>Factorization</strong> <strong>of</strong> N<br />

b whose norm ||b|| satisfies ||b|| ≤ 2 ω−1<br />

4 (det(L)) 1 ω. The vector b is the coefficient<br />

vector <strong>of</strong> the polynomial h(xX) with ||h(xX)|| = ||b||, where h(x) is the integer<br />

linear combination <strong>of</strong> the polynomials g ij (x). Hence h(−x 0 ) ≡ 0 (mod p 2m ). To<br />

apply Lemma 2.20 and Lemma 2.22 for finding the integer root <strong>of</strong> h(x), we need<br />

2 ω−1<br />

4 (det(L)) 1 ω <<br />

p 2m<br />

√ ω<br />

. (7.3)<br />

Note that ω is the dimension <strong>of</strong> the lattice which we may consider as small<br />

constant with respect to the size <strong>of</strong> p and the elements <strong>of</strong> L. Thus, neglecting 2 ω−1<br />

4<br />

and √ ω, we can rewrite (7.3) as det(L) < p 2mω . Substituting the expression <strong>of</strong><br />

det(L) from Equation (7.2) and using X = N β ,p ≈ N γ we get<br />

(m+t)(m+t+1)<br />

β +m(m+1) < 2m(m+t+1)γ. (7.4)<br />

2<br />

Let t = τm. Then neglecting the terms <strong>of</strong> o(m 2 ) we can rewrite (7.4) as<br />

τ 2 β<br />

2 +(β −2γ)τ + β 2<br />

−2γ +1 < 0. (7.5)<br />

Now, the optimal value <strong>of</strong> τ to minimize the left hand side <strong>of</strong> (7.5) is 2γ−β<br />

β . Putting<br />

this optimal value in (7.5), we get β −2γ 2 < 0.<br />

Our strategy uses LLL algorithm [77] to find h(x) and then calculates the<br />

integer root <strong>of</strong> h(x). Both these steps are deterministic polynomial time in logN.<br />

Thus the result.<br />

Corollary 7.2. Factoring N is deterministic polynomial time equivalent to finding<br />

q −1 mod p, where N = pq and p > q.<br />

Pro<strong>of</strong>. When no approximation <strong>of</strong> p is given, then β in the Theorem 7.1 is equal<br />

to γ. Putting β = γ in the condition β−2γ 2 < 0, we get γ > 1 . This requirement<br />

2<br />

forces the condition that p > q. Also, it is trivial to note that if the factorization<br />

<strong>of</strong> N is known then one can efficiently compute q −1 mod p. Thus the pro<strong>of</strong>.<br />

Corollary 7.3. Factoring N is deterministic polynomial time equivalent to finding<br />

q −1 mod p, where N = pq and p,q are <strong>of</strong> same bit size.<br />

Pro<strong>of</strong>. The pro<strong>of</strong> <strong>of</strong> the case p > q is already taken care in Corollary 7.2. Now<br />

consider q > p. When p,q are <strong>of</strong> same bit size and p < q, then p < q < 2p, i.e.,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!