11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 7: Approximate Integer Common Divisor Problem 136<br />

Pro<strong>of</strong>. It is given that γ 1 log 2 N many MSBs and γ 2 log 2 N many LSBs <strong>of</strong><br />

p 1 ,p 2 ,...,p k are same. We consider γ 1 log 2 N and γ 2 log 2 N as integers, so it is<br />

clear that N γ 1<br />

,N γ 2<br />

are integers too. Thus, we can write the following equations.<br />

p 2 = p 1 +N γ2˜x 2 ,<br />

p 3 = p 1 +N γ2˜x 3 ,<br />

.<br />

p k = p 1 +N γ2˜x k .<br />

Using the above relations, we have 1<br />

N i q 1 −N 1 q i = N γ2˜x i q i q 1 for 1 < i ≤ k. (7.24)<br />

Suppose, µN γ 2<br />

≡ 1 mod N 1 . Now, multiplying Equation (7.24) by µ, we get<br />

µN i q 1 − ˜x i q i q 1 ≡ 0 (mod N 1 ). Let b i ≡ µN i (mod N 1 ) for 1 < i ≤ k. (Note that,<br />

for any i, b i is <strong>of</strong> O(N 1 ), i.e., O(N).) Thus we have,<br />

b i q 1 − ˜x i q i q 1 ≡ 0 (mod N 1 ) ⇒ b i − ˜x i q i ≡ 0 (mod p 1 ) for 1 < i ≤ k.<br />

Our first aim is to find ˜x i q i from the knowledge <strong>of</strong> N 1 and b 2 ,...,b k . Then,<br />

using ˜x i q i , we want to find the factorization <strong>of</strong> N i for 1 ≤ i ≤ k. Here we have<br />

˜x i ≈ N 1−α−γ 1−γ 2<br />

for 1 ≤ i ≤ k. Then, following the similar technique as in the<br />

pro<strong>of</strong> <strong>of</strong> Theorem 7.12, the desired result is achieved.<br />

We extend the results related to MSBs (as in Theorem 7.12 and earlier) in<br />

the case <strong>of</strong> LSBs as well as in the case <strong>of</strong> MSBs and LSBs taken together (as in<br />

Theorem 7.5.1). As this method works for the case where MSBs and LSBs are<br />

considered together, it also works for the case where only the LSBs are shared. In<br />

such a case, we can consider that just a single bit from the MSB side (the first<br />

MSB, which is surely 1 for all the primes) is shared.<br />

1 One may note that similar equations as in Equation (7.24) have been used in [40] to construct<br />

the lattice only for the case <strong>of</strong> most significant bits. However, here we use these for the case<br />

when the equal bits are spread out between most and least significant bits.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!