Browse > Article
http://dx.doi.org/10.7236/JIIBC.2014.14.6.25

Reverse Baby-step 2k-ary Adult-step Method for 𝜙((n) Decryption of Asymmetric-key RSA  

Lee, Sang-Un (Dept. of Multimedia Eng., Gangneung-Wonju National University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.14, no.6, 2014 , pp. 25-31 More about this Journal
Abstract
When the public key e and the composite number n=pq are disclosed but not the private key d in an asymmetric-key RSA, message decryption is carried out by obtaining ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$ and subsequently computing $d=e^{-1}(mod{\phi}(n))$. The most commonly used decryption algorithm is integer factorization of n/p=q or $a^2{\equiv}b^2$(mod n), a=(p+q)/2, b=(q-p)/2. But many of the RSA numbers remain unfactorable. This paper therefore applies baby-step giant-step discrete logarithm and $2^k$-ary modular exponentiation to directly obtain ${\phi}(n)$. The proposed algorithm performs a reverse baby-step and $2^k$-ary adult-step. As a results, it reduces the execution time of basic adult-step to $1/2^k$ times and the memory $m={\lceil}\sqrt{n}{\rceil}$ to l, $a^l$ > n, hence obtaining ${\phi}(n)$ by executing within l times.
Keywords
Euler's totient function; Integer factorization; Discrete logarithm; Baby-step giant-step; Modular exponentiation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction to Algorithms," 2nd Ed., MIT Press and McGraw-Hill. pp. 887-896, 2001.
2 C. P. Schnorr, "Refined analysis and improvements on some factoring algorithms", Journal of Algorithms, Vol. 3, No. 2, pp. 101-127, 1982.   DOI
3 D. R. Stinson, "Cryptography: Theory and Practice," 3rd ed., London, CRC Press, 2006.
4 B. Raiter, "How the RSA Cipher Works", http://www.tutorialized.com/tutorial/How-the-RSA-Cipher-Works/42395, 2009.
5 M. Seysen, "A probabilistic factorization algorithm with quadratic forms of negative discriminant", Mathematics of Computation, Vol. 48, No. 178, pp. 757-780, 1987.   DOI
6 Wikipedia, "Integer Factorization," http://en.wikipedia.org/wiki/Integer_factorization, 2014.
7 Wikipedia, "RSA Factoring Challenge," http://en.wikipedia.org/wiki/RSA_Factoring_challenge, 2014.
8 K. Ford, "The Number of Solutions of ${\phi}$ (x)=m", Annals of Mathematics, Vol. 150, No. 1, pp. 283-311, 1999.   DOI
9 A. Stein and E. Teske, "Optimized Baby step-Giant step Methods," Journal of the Ramanujan Mathematical Society, Vol. 20, No. 1, pp. 1-32, 2005.
10 S. Bruce, "Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed.", Wiley, 1996.
11 D. C. Terr, "A modification of Shanks' Baby-step Giant-step algorithm," Mathematics of Computation, Vol. 69, pp. 767-773, 2000.
12 J. Pollard, "Monte Carlo methods for index computation mod p", Mathematics of Computation, Vol. 32, 1978.
13 A. A. Razborov and S. Rudich, "Natural proofs", Journal of Computer and System Sciences, Vol. 55, pp. 24-35, 1997.   DOI   ScienceOn
14 S. T. Klein, "Should One Always Use Repeated Squaring for Modular Exponentiation?", Information Processing Letters, Vol. 106, Issue. 6, pp. 232-237, 2008.   DOI   ScienceOn