Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
129 7.4 The General Solution for EPACDP<br />
Now let t = τm. Neglecting the o(m 2 ) terms <strong>of</strong> (7.16), we have<br />
(<br />
ψ(α,β,τ) = −(α+β) τ2 3α<br />
2 −(2α+β −1)τ − 2 + β 2 − 1 )<br />
> 0. (7.17)<br />
2<br />
The optimal value <strong>of</strong> τ, to maximize β for a fixed α is<br />
τ =<br />
1−β −2α<br />
.<br />
α+β<br />
Putting the optimal value <strong>of</strong> τ in (7.17), we get<br />
α 2 −3α−β +1 > 0. (7.18)<br />
Once x 0 q 2 , integer root <strong>of</strong> h(x), is known, we get p 1 from gcd(N 1 ,N 2 +x 0 q 2 ).<br />
As long as |x 0 q 2 | < p 1 , we get q 2 by calculating the floor or ceiling <strong>of</strong> N 2<br />
p 1<br />
. As<br />
|x 0 q 2 | ≤ N α+β and p 1 ≈ N 1−α , to satisfy |x 0 q 2 | ≤ p 1 we need 2α+β ≤ 1, which is<br />
true from (7.18).<br />
Our strategy uses the LLL [77] algorithm to find h(x) and then calculates the<br />
integer root <strong>of</strong> h(x). Both these steps are deterministic polynomial time in logN.<br />
Thus the result.<br />
Therelationpresentedin(7.16)providestheboundwhenthelatticeparameters<br />
m,t are specified. The asymptotic relation, independent <strong>of</strong> the lattice parameters,<br />
hasbeenpresentedin(7.18). Thisisthetheoreticalboundandmaynotbereached<br />
in practice as we work with low lattice dimensions. Now let us compare our results<br />
with that <strong>of</strong> Chapter 6.<br />
1. In Corollary 6.4 <strong>of</strong> Chapter 6, it has been explained that factorization <strong>of</strong><br />
N 1 ,N 2 will be successful when<br />
Ψ(α,β) = 4α 2 +2αβ + 1 4 β2 −4α− 5 β +1 > 0,<br />
3<br />
providedthat1− 3β−2α ≥ 0. Inourcase,theupperbound<strong>of</strong>β 2 isα2 −3α+1.<br />
Putting this upper bound <strong>of</strong> β in Ψ we get α ≤ 0.33 ⇒ Ψ(α,β) < 0. Hence<br />
our upper bound on β will be greater than that <strong>of</strong> Chapter 6 when α ≤ 0.33.<br />
2. The result presented in Chapter 6 is a poly(logN) time heuristic (based<br />
on Assumption 1), whereas our algorithm in this chapter is deterministic