11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2: Mathematical Preliminaries 42<br />

Attack by Ernst et al [38]<br />

In 2005, Ernst et al [38] studied the case when some most significant bits (MSBs)<br />

<strong>of</strong> the decryption exponent d are known to the attacker. In such a situation,<br />

the attacker needs to find out the root <strong>of</strong> a polynomial <strong>of</strong> the form f(x,y,z) =<br />

a 0 +a 1 x+a 2 y+a 3 yz. Let (x 0 ,y 0 ,z 0 ) be the root <strong>of</strong> f(x,y,z) satisfying |x 0 | < X,<br />

|y 0 | < Y and |z 0 | < Z. Now suppose that we use extra shifts over the variable z.<br />

Let us discuss the technique with m = 1,µ = 1. In this case, we have<br />

S = {1,x,y,z,xz,yz,yz 2 }, and<br />

M = {1,x,y,z,xz,yz,yz 2 ,x 2 ,xy,xyz,y 2 ,y 2 z,x 2 z,xyz 2 ,y 2 z 2 ,y 2 z 3 }.<br />

In this case W = max{|a 0 |,|a 1 X|,|a 2 Y|,|a 3 YZ|}. Define R = XYZ 2 W, and<br />

calculate f ′ (x,y,z) = a −1<br />

0 f(x,y,z) mod R = 1+ax+by +cyz. In this case, one<br />

uses the shift polynomials<br />

P 1 ={f ′ XYZ 2 ,xf ′ YZ 2 ,yf ′ XZ 2 ,zf ′ XYZ,xzf ′ YZ,yzf ′ XZ,yz 2 f ′ X}, and<br />

P 2 ={x 2 R,xyR,xyzR,y 2 R,y 2 zR,x 2 zR,xyz 2 R,y 2 z 2 R,y 2 z 3 R},<br />

and builds a lattice L with the basis elements coming from the coefficients <strong>of</strong><br />

p(xX,yY,zZ) where p ∈ P 1 ∪P 2 . The lattice L is represented as follows.<br />

poly 1 x y z xz yz yz 2 x 2 xy xyz y 2 y 2 z x 2 z xyz 2 y 2 z 2 y 2 z 3<br />

f ′ XY Z 2 T − − −<br />

xf ′ Y Z 2 T − − −<br />

yf ′ XZ 2 T − − −<br />

zf ′ XY Z T − − −<br />

xzf ′ Y Z T − − −<br />

yzf ′ XZ T − − −<br />

yz 2 f ′ X T − − −<br />

x 2 R<br />

X 2 R<br />

xyR<br />

XY R<br />

xyzR<br />

XY ZR<br />

y 2 R<br />

Y 2 R<br />

y 2 zR<br />

Y 2 ZR<br />

x 2 zR<br />

X 2 ZR<br />

xyz 2 R<br />

XY Z 2 R<br />

y 2 z 2 R<br />

Y 2 Z 2 R<br />

y 2 z 3 R<br />

Y 2 Z 3 R<br />

Here T = XYZ 2 and ‘−’ denotes the non zero elements in the matrix. If we<br />

perform the LLL lattice reduction on L, we get two polynomials f 1 (x,y,z) and<br />

f 2 (x,y,z) which share the root (x 0 ,y 0 ,z 0 ) <strong>of</strong> f(x,y,z). From f,f 1 ,f 2 , we can<br />

collect the root (x 0 ,y 0 ,z 0 ) by calculating the resultants, subject to Assumption 1.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!