DOI QRμ½”λ“œ

DOI QR Code

Reverse Baby-step 2k-ary Adult-step Method for πœ™((n) Decryption of Asymmetric-key RSA

λΉ„λŒ€μΉ­ν‚€ RSA의 πœ™(n) 해독을 μœ„ν•œ μ—­ μ•„κΈ°κ±ΈμŒ- 2k-ary μ„±μΈκ±ΈμŒλ²•

  • Lee, Sang-Un (Dept. of Multimedia Eng., Gangneung-Wonju National University)
  • μ΄μƒμš΄ (κ°•λ¦‰μ›μ£ΌλŒ€ν•™κ΅ κ³Όν•™κΈ°μˆ λŒ€ν•™ 멀티미디어곡학과)
  • Received : 2014.08.13
  • Accepted : 2014.12.12
  • Published : 2014.12.31

Abstract

When the public key e and the composite number n=pq are disclosed but not the private key d in an asymmetric-key RSA, message decryption is carried out by obtaining ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$ and subsequently computing $d=e^{-1}(mod{\phi}(n))$. The most commonly used decryption algorithm is integer factorization of n/p=q or $a^2{\equiv}b^2$(mod n), a=(p+q)/2, b=(q-p)/2. But many of the RSA numbers remain unfactorable. This paper therefore applies baby-step giant-step discrete logarithm and $2^k$-ary modular exponentiation to directly obtain ${\phi}(n)$. The proposed algorithm performs a reverse baby-step and $2^k$-ary adult-step. As a results, it reduces the execution time of basic adult-step to $1/2^k$ times and the memory $m={\lceil}\sqrt{n}{\rceil}$ to l, $a^l$ > n, hence obtaining ${\phi}(n)$ by executing within l times.

λΉ„λŒ€μΉ­ν‚€ RSA의 κ³΅κ°œν‚€ e와 ν•©μ„±μˆ˜ n=pq은 μ•Œκ³  있고 κ°œμΈν‚€ dλ₯Ό λͺ¨λ₯Ό λ•Œ, ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$을 κ΅¬ν•˜μ—¬ $d=e^{-1}(mod{\phi}(n))$으둜 κ°œμΈν‚€ dλ₯Ό ν•΄λ…ν•œλ‹€. μ•”ν˜Έν•΄λ…μ€ 일반적으둜 n/p=q λ˜λŠ” $a^2{\equiv}b^2$(mod n), a=(p+q)/2,b=(q-p)/2λ₯Ό κ΅¬ν•˜λŠ” μ†ŒμΈμˆ˜ 뢄해법이 널리 적용되고 μžˆλ‹€. κ·ΈλŸ¬λ‚˜ μ•„μ§κΉŒμ§€λ„ λ§Žμ€ RSA μˆ˜λ“€μ΄ ν•΄λ…λ˜μ§€ μ•Šκ³  μžˆλ‹€. λ³Έ 논문은 ${\phi}(n)$을 직접 κ΅¬ν•˜λŠ” μ•Œκ³ λ¦¬μ¦˜μ„ μ œμ•ˆν•˜μ˜€λ‹€. μ œμ•ˆλœ μ•Œκ³ λ¦¬μ¦˜μ€ μ΄μ‚°λŒ€μˆ˜μ˜ μ•„κΈ°κ±ΈμŒ-κ±°μΈκ±ΈμŒλ²•κ³Ό λͺ¨λ“ˆλŸ¬ μ§€μˆ˜μ—°μ‚°μ˜ $2^k$-ary법을 μ μš©ν•˜μ˜€λ‹€. 이 μ•Œκ³ λ¦¬μ¦˜μ€ μ—­-μ•„κΈ°κ±ΈμŒκ³Ό $2^k$-ary μ„±μΈκ±ΈμŒλ²•μ„ μ μš©ν•˜μ—¬ 기본적인 μ„±μΈκ±ΈμŒλ²• μˆ˜ν–‰νšŸμˆ˜λ₯Ό $1/2^k$둜 쀄이고, $m={\lfloor}\sqrt{n}{\rfloor}$의 μ €μž₯ λ©”λͺ¨λ¦¬ μš©λŸ‰λ„ l, $a^l$ > n둜 κ°μ†Œμ‹œμΌœ ${\phi}(n)$을 l회 μ΄λ‚΄λ‘œ κ΅¬ν•˜μ˜€λ‹€.

Keywords

References

  1. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction to Algorithms," 2nd Ed., MIT Press and McGraw-Hill. pp. 887-896, 2001.
  2. D. R. Stinson, "Cryptography: Theory and Practice," 3rd ed., London, CRC Press, 2006.
  3. B. Raiter, "How the RSA Cipher Works", http://www.tutorialized.com/tutorial/How-the-RSA-Cipher-Works/42395, 2009.
  4. M. Seysen, "A probabilistic factorization algorithm with quadratic forms of negative discriminant", Mathematics of Computation, Vol. 48, No. 178, pp. 757-780, 1987. https://doi.org/10.1090/S0025-5718-1987-0878705-X
  5. C. P. Schnorr, "Refined analysis and improvements on some factoring algorithms", Journal of Algorithms, Vol. 3, No. 2, pp. 101-127, 1982. https://doi.org/10.1016/0196-6774(82)90012-8
  6. Wikipedia, "Integer Factorization," http://en.wikipedia.org/wiki/Integer_factorization, 2014.
  7. Wikipedia, "RSA Factoring Challenge," http://en.wikipedia.org/wiki/RSA_Factoring_challenge, 2014.
  8. K. Ford, "The Number of Solutions of ${\phi}$ (x)=m", Annals of Mathematics, Vol. 150, No. 1, pp. 283-311, 1999. https://doi.org/10.2307/121103
  9. A. Stein and E. Teske, "Optimized Baby step-Giant step Methods," Journal of the Ramanujan Mathematical Society, Vol. 20, No. 1, pp. 1-32, 2005.
  10. D. C. Terr, "A modification of Shanks' Baby-step Giant-step algorithm," Mathematics of Computation, Vol. 69, pp. 767-773, 2000.
  11. J. Pollard, "Monte Carlo methods for index computation mod p", Mathematics of Computation, Vol. 32, 1978.
  12. A. A. Razborov and S. Rudich, "Natural proofs", Journal of Computer and System Sciences, Vol. 55, pp. 24-35, 1997. https://doi.org/10.1006/jcss.1997.1494
  13. S. Bruce, "Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed.", Wiley, 1996.
  14. S. T. Klein, "Should One Always Use Repeated Squaring for Modular Exponentiation?", Information Processing Letters, Vol. 106, Issue. 6, pp. 232-237, 2008. https://doi.org/10.1016/j.ipl.2007.11.016