Partial Key Exposure Attack on RSA
Transcription
Partial Key Exposure Attack on RSA
Partial Key Exposure Attack on RSA Eirik Fosser fosser@umail.ucsb.edu Eirik Klevstad klevstad@umail.ucsb.edu April 25, 2015 Abstract For this project we aim to understand and give a tutorial in the Partial Key Exposure Attack on RSA, based on [1]. We are going to look at two types of attacks, √ one where the public key exponent e is of smaller size (smaller than N where N is the product of two primes p n n and q) and one where the exponent is of medium size (2 4 < e < 2 2 ). The idea of the attack is that if an adversary is exposed to a part of the most significant(or least significant) bits of the private key, it may be able to recover the key in its entirety. The attack is interesting as it shows the importance of keeping every single bit of the private key hidden, as well as ensuring that the public key is large. The tutorial will have a focus on the two attacks, as well as looking at improvements of the original attack, where the public key exponent e may be even larger[2]. If time allows it, we’d like to implement the original attack in the Python programming language. This would be for small exponents as these are feasible to break in time O(e ∗ log2 (e)). References [1] D. Boneh, G. Durfee, and Y. Franke An attack on RSA given a fraction of the private key bits., AsiaCrypt ’98, volume 1514 of Lecture Notes in Computer Science, pages 25-34. 1998 [2] J. Blömer and A. May New Partial Key Exposure Attacks on RSA., Advances in Cryptography - Crypto ’03, 23rd Annual International Cryptology Conference, pages 27-43. 2003 1