New compendium of RSA vulnerabilities
RSA cryptosystem is the most widely deployed public-key encryption scheme in the digital world. It utilizes a hard mathematical problem known as the integer factorization problem (IFP) to confide digital data in transit or at rest. Cryptanalysis against RSA and its variants is vital to point out...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/90077/1/IPM%202020%2010%20ir.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-upm-ir.90077 |
---|---|
record_format |
uketd_dc |
spelling |
my-upm-ir.900772021-12-02T06:31:15Z New compendium of RSA vulnerabilities 2020-01 Abd Ghafar, Amir Hamzah RSA cryptosystem is the most widely deployed public-key encryption scheme in the digital world. It utilizes a hard mathematical problem known as the integer factorization problem (IFP) to confide digital data in transit or at rest. Cryptanalysis against RSA and its variants is vital to point out the weaknesses in the cryptosystem. It also acts as reference points to maintain beyond doubt security aspects of the cryptosystem. Most cryptanalysis or commonly called ‘attacks’ upon RSA focuses on solving the IFP in feasible time. It is based on strategies exploiting the mathematical structures or the implementation workflows of the scheme in hope that it can be emulated by real-world adversary. This thesis compiles five new attacks against the RSA cryptosystem. In the first attack, the RSA primes, p and q do not have small primes factors for p-1 and q-1. This result extends the Pollard’s attack. The second attack focuses on RSA primes with the structure of p = am +rp and q = bm +rq where a,b are very large integers, rp, rq are small integers and m is the power of 2. The attack also takes into the consideration when rp and rq are the least significant bits of p and q. In the third attack, the adversary is assumed capable to retrieve some most significant bits of the RSA private exponent, d of a standard RSA scheme. The fourth attack runs the similar strategies used by the third attack with one exception, it is conducted on an RSA variant known as Chinese Remainder Theorem-RSA. Both third and fourth attacks outlines new weaknesses within RSA public parameters that lead to the factorization of N. We also provide an estimation on the number of possible occurrence. In the final attack, the thesis explores the possibility on how an adversary can break the security of RSA by using vulnerable digital certificates due to its weak RSA key pairs, (N,e). The attack is conducted on a single modified RSA key equation and also the system of modified RSA key equations. Cryptography Data encryption (Computer science) Computer networks - Security measures 2020-01 Thesis http://psasir.upm.edu.my/id/eprint/90077/ http://psasir.upm.edu.my/id/eprint/90077/1/IPM%202020%2010%20ir.pdf text en public doctoral Universiti Putra Malaysia Cryptography Data encryption (Computer science) Computer networks - Security measures Kamel Ariffin, Muhammad Rezal |
institution |
Universiti Putra Malaysia |
collection |
PSAS Institutional Repository |
language |
English |
advisor |
Kamel Ariffin, Muhammad Rezal |
topic |
Cryptography Data encryption (Computer science) Computer networks - Security measures |
spellingShingle |
Cryptography Data encryption (Computer science) Computer networks - Security measures Abd Ghafar, Amir Hamzah New compendium of RSA vulnerabilities |
description |
RSA cryptosystem is the most widely deployed public-key encryption scheme in
the digital world. It utilizes a hard mathematical problem known as the integer
factorization problem (IFP) to confide digital data in transit or at rest. Cryptanalysis
against RSA and its variants is vital to point out the weaknesses in the cryptosystem.
It also acts as reference points to maintain beyond doubt security aspects of the
cryptosystem. Most cryptanalysis or commonly called ‘attacks’ upon RSA focuses
on solving the IFP in feasible time. It is based on strategies exploiting the
mathematical structures or the implementation workflows of the scheme in hope that
it can be emulated by real-world adversary.
This thesis compiles five new attacks against the RSA cryptosystem. In the first
attack, the RSA primes, p and q do not have small primes factors for p-1 and
q-1. This result extends the Pollard’s attack. The second attack focuses on RSA
primes with the structure of p = am +rp and q = bm +rq where a,b are very large
integers, rp, rq are small integers and m is the power of 2. The attack also takes into
the consideration when rp and rq are the least significant bits of p and q.
In the third attack, the adversary is assumed capable to retrieve some most significant
bits of the RSA private exponent, d of a standard RSA scheme. The fourth attack
runs the similar strategies used by the third attack with one exception, it is conducted
on an RSA variant known as Chinese Remainder Theorem-RSA. Both third and
fourth attacks outlines new weaknesses within RSA public parameters that lead to
the factorization of N. We also provide an estimation on the number of possible occurrence. In the final attack, the thesis explores the possibility on how an adversary
can break the security of RSA by using vulnerable digital certificates due to its
weak RSA key pairs, (N,e). The attack is conducted on a single modified RSA
key equation and also the system of modified RSA key equations. |
format |
Thesis |
qualification_level |
Doctorate |
author |
Abd Ghafar, Amir Hamzah |
author_facet |
Abd Ghafar, Amir Hamzah |
author_sort |
Abd Ghafar, Amir Hamzah |
title |
New compendium of RSA vulnerabilities |
title_short |
New compendium of RSA vulnerabilities |
title_full |
New compendium of RSA vulnerabilities |
title_fullStr |
New compendium of RSA vulnerabilities |
title_full_unstemmed |
New compendium of RSA vulnerabilities |
title_sort |
new compendium of rsa vulnerabilities |
granting_institution |
Universiti Putra Malaysia |
publishDate |
2020 |
url |
http://psasir.upm.edu.my/id/eprint/90077/1/IPM%202020%2010%20ir.pdf |
_version_ |
1747813608232845312 |