11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

129 7.4 The General Solution for EPACDP<br />

Now let t = τm. Neglecting the o(m 2 ) terms <strong>of</strong> (7.16), we have<br />

(<br />

ψ(α,β,τ) = −(α+β) τ2 3α<br />

2 −(2α+β −1)τ − 2 + β 2 − 1 )<br />

> 0. (7.17)<br />

2<br />

The optimal value <strong>of</strong> τ, to maximize β for a fixed α is<br />

τ =<br />

1−β −2α<br />

.<br />

α+β<br />

Putting the optimal value <strong>of</strong> τ in (7.17), we get<br />

α 2 −3α−β +1 > 0. (7.18)<br />

Once x 0 q 2 , integer root <strong>of</strong> h(x), is known, we get p 1 from gcd(N 1 ,N 2 +x 0 q 2 ).<br />

As long as |x 0 q 2 | < p 1 , we get q 2 by calculating the floor or ceiling <strong>of</strong> N 2<br />

p 1<br />

. As<br />

|x 0 q 2 | ≤ N α+β and p 1 ≈ N 1−α , to satisfy |x 0 q 2 | ≤ p 1 we need 2α+β ≤ 1, which is<br />

true from (7.18).<br />

Our strategy uses the LLL [77] algorithm to find h(x) and then calculates the<br />

integer root <strong>of</strong> h(x). Both these steps are deterministic polynomial time in logN.<br />

Thus the result.<br />

Therelationpresentedin(7.16)providestheboundwhenthelatticeparameters<br />

m,t are specified. The asymptotic relation, independent <strong>of</strong> the lattice parameters,<br />

hasbeenpresentedin(7.18). Thisisthetheoreticalboundandmaynotbereached<br />

in practice as we work with low lattice dimensions. Now let us compare our results<br />

with that <strong>of</strong> Chapter 6.<br />

1. In Corollary 6.4 <strong>of</strong> Chapter 6, it has been explained that factorization <strong>of</strong><br />

N 1 ,N 2 will be successful when<br />

Ψ(α,β) = 4α 2 +2αβ + 1 4 β2 −4α− 5 β +1 > 0,<br />

3<br />

providedthat1− 3β−2α ≥ 0. Inourcase,theupperbound<strong>of</strong>β 2 isα2 −3α+1.<br />

Putting this upper bound <strong>of</strong> β in Ψ we get α ≤ 0.33 ⇒ Ψ(α,β) < 0. Hence<br />

our upper bound on β will be greater than that <strong>of</strong> Chapter 6 when α ≤ 0.33.<br />

2. The result presented in Chapter 6 is a poly(logN) time heuristic (based<br />

on Assumption 1), whereas our algorithm in this chapter is deterministic

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!