11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

139 7.6 Improved Results for Larger k<br />

comparison <strong>of</strong> our work with that <strong>of</strong> [40].<br />

Very recently, M. Ritzenh<strong>of</strong>en [107] presented a distinct lattice based approach<br />

for the problem <strong>of</strong> implicit factorization with shared MSBs and LSBs <strong>of</strong><br />

p 1 ,p 2 ,...,p k . The strategy <strong>of</strong> [107, Theorem 6.1.7] works when β ≤ 1−α− k<br />

k−1 α.<br />

Similar to our comparison with that <strong>of</strong> [86] for LSB case, it can be noted that our<br />

method requires less number <strong>of</strong> bits to be shared compared to [107].<br />

We have explained our results for the MSB case as well as LSB case and<br />

compared with state <strong>of</strong> the art literature. The experimental results in both the<br />

cases are <strong>of</strong> similar quality using our techniques. Similar results are achieved<br />

in our case if one considers sharing <strong>of</strong> MSBs and LSBs together in the primes<br />

p 1 ,p 2 ,...,p k . Thus, we do not repeat these results.<br />

7.6 Improved Results for Larger k<br />

In [128, Section 5.2], the authors studied the EPACDP for analyzing the security<br />

<strong>of</strong> their scheme. Initially this strategy has been analyzed in [73,74]. Based on the<br />

idea presented in [128], we get Theorem 7.14. The result in Theorem 7.14 below<br />

is not exactly presented in a similar form in [128].<br />

In case <strong>of</strong> EPACDP, one can write<br />

a 1 = gq 1 ,<br />

ã 2 = gq 2 − ˜x 2 ,<br />

.<br />

ã k = gq k − ˜x k .<br />

Let us construct the matrix<br />

⎛<br />

M =<br />

⎜<br />

⎝<br />

⎞<br />

2 ρ ã 2 ã 3 ... ã k<br />

0 −a 1 0 ... 0<br />

. . .<br />

...<br />

⎟<br />

. ⎠<br />

0 0 0 ... −a 1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!