RSA에 사용된 파라메터들에 관한 고찰

  • Published : 2003.09.01

Abstract

The RSA cryptosystem is most commonly used for providing privacy and ensuring authenticity of digital data. 1'his system is based on the difficulty of integer factoring. Many attacks had been done, but none of them devastating. They mostly illustrate the dangers of improper use of RSA. Improper use implies many aspects, but here we imply the misuse of the parameters of RSA. Specially, sizes of parameters give strong effects on the efficiency and the security of the system. Parameters are also related each other. We analyze the relation of them. Recently many researchers are interested in side-channel attacks. We also investigate partial key exposure attacks, which was motivated by side-channel attacks. If a fraction of tile secret key bits is revealed, the private key will be reconstructed. We also study mathematical background of these attacks, solving modular multivariate polynomial equations.

Keywords

References

  1. Notices of the AMS v.46 no.2 Twenty years of attacks on the RSA cryptosystem Boneh,D.
  2. IEEE Transaction on info. Th. v.36 no.3 Cryptanalysis of short RSA secret exponents Wiener,M.
  3. Applicable Algebra in Engineering, Communication and Computing v.8 Cryptanalysis of less short RSA secret exponents Verhol,E.;van Tilborg,H.
  4. Proc, of CRYPTO 2002, LNCS 2422 Cryptanalysis of RSA with private key d less than $N^ {0.292}$ Boneh,D.;Durfee,G.
  5. Proc. of Asiacrypt'99, Vol. 1716 of LNCS On the design of RSA with short secret exponent Sun,H.M.;Yang,W.C.;Laih,C.S.
  6. Proceedings of Asiacrypt 2000, LNCS Cryptanalysis for the RSA schemes with short secret exponent from Asiacrypt'99 Durfee,G.;Nguyen,P.Q.
  7. Applied Mathematics and Computation v.139 no.2-3 The better bound of private key in RSA with unbalanced primes Hong,H.S.;Lee,H.K.;Lee,H.S.;Lee,H.J.
  8. Proc. of CRYPTO 2002, LNCS 2442 Cryptanalysis of Unbalanced RSA with Small CRT-Exponent May,A.
  9. Exposing an RSA given a small fraction of the private key bits, Asiacrypt98 v.1514 Boneh;Durfee;Frankel
  10. Proc. of CRYPTO 2003, LNCS New Partial Key Exposure Attacks on RSA May,A.
  11. Journal of Cryptology v.10 Small solutions to polynomial equations and low exponent RSA vulnerabilities Coppersmith,D.
  12. IBM research report Finding small solutions to small degree polymials Coppersmith,D.
  13. Proceedings Cryptography and Coding, LNCS v.1355 Finding small roots of univariate modular equations revisited Howgrave Graham,N.