Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.7.071

A 2kβ Algorithm for Euler function 𝜙(n) Decryption of RSA  

Lee, Sang-Un (Dept. of Multimedia Eng., Gangneung-Wonju National University)
Abstract
There is to be virtually impossible to solve the very large digits of prime number p and q from composite number n=pq using integer factorization in typical public-key cryptosystems, RSA. When the public key e and the composite number n are known but the private key d remains unknown in an asymmetric-key RSA, message decryption is carried out by first obtaining ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$ and then using a reverse function of $d=e^{-1}(mod{\phi}(n))$. Integer factorization from n to p,q is most widely used to produce ${\phi}(n)$, which has been regarded as mathematically hard. Among various integer factorization methods, the most popularly used is the congruence of squares of $a^2{\equiv}b^2(mod\;n)$, a=(p+q)/2,b=(q-p)/2 which is more commonly used then n/p=q trial division. Despite the availability of a number of congruence of scares methods, however, many of the RSA numbers remain unfactorable. This paper thus proposes an algorithm that directly and immediately obtains ${\phi}(n)$. The proposed algorithm computes $2^k{\beta}_j{\equiv}2^i(mod\;n)$, $0{\leq}i{\leq}{\gamma}-1$, $k=1,2,{\ldots}$ or $2^k{\beta}_j=2{\beta}_j$ for $2^j{\equiv}{\beta}_j(mod\;n)$, $2^{{\gamma}-1}$ < n < $2^{\gamma}$, $j={\gamma}-1,{\gamma},{\gamma}+1$ to obtain the solution. It has been found to be capable of finding an arbitrarily located ${\phi}(n)$ in a range of $n-10{\lfloor}{\sqrt{n}}{\rfloor}$ < ${\phi}(n){\leq}n-2{\lfloor}{\sqrt{n}}{\rfloor}$ much more efficiently than conventional algorithms.
Keywords
Euler's totient function; integer factorization; modular exponentiation; discrete logarithm; collide;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 D. R. Stinson, "Cryptography: Theory and Practice," 3rd ed., London, CRC Press, 2006.
2 T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction to Algorithms," 2nd Ed., MIT Press and McGraw-Hill. pp. 887-896, 2001.
3 B. Raiter, "How the RSA Cipher Works", http://www.tutorialized.com/tutorial/How-the-RSA-Cipher-Works/42395, 2009.
4 M. Seysen, "A probabilistic factorization algorithm with quadratic forms of negative discriminant", Mathematics of Computation, Vol. 48, No. 178, pp. 757-780, Apr. 1987.   DOI
5 C. P. Schnorr, "Refined analysis and improvements on some factoring algorithms", Journal of Algorithms, Vol. 3, No. 2, pp. 101-127, Jun. 1982.   DOI
6 Wikipedia, "Integer Factorization," http://en.wikipedia.org/wiki/Integer_factorization, 2014.
7 Wikipedia, "RSA Factoring Challenge," http://en.wikipedia.org/wiki/RSA_Factoring_challenge, 2014.
8 K. Ford, "The Number of Solutions of ${\phi}$ (x)=m", Annals of Mathematics, Vol. 150, No. 1, pp. 283-311, Jan. 1999.   DOI
9 A. A. Razborov and S. Rudich, "Natural proofs", Journal of Computer and System Sciences, Vol. 55, No. 1, pp. 24-35, Aug. 1997.   DOI   ScienceOn
10 A. Stein and E. Teske, "Optimized Baby step-Giant step Methods," Journal of the Ramanujan Mathematical Society, Vol. 20, No. 1, pp. 1-32, Jan. 2005.
11 D. C. Terr, "A modification of Shanks' Baby-step Giant-step algorithm," Mathematics of Computation, Vol. 69, No. 230, pp. 767-773, Apr. 2000.
12 S. U. Lee, "Modified Baby-Step Giant-Step Algorithm for Discrete Logarithm," Journal of Korea Society of Computer Information, Vol. 18, No. 8, pp. 87-93, Aug. 2013.   과학기술학회마을   DOI   ScienceOn
13 S. U. Lee, "Square-and-Divide Modular Exponentiation," Journal of Korea Society of Computer Information, Vol. 18, No. 4, pp. 123-129, Apr. 2013.   과학기술학회마을   DOI   ScienceOn