Serveur d'exploration sur Pittsburgh

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

On the improvement of Wiener attack on RSA with small private exponent.

Identifieur interne : 001E75 ( PubMed/Checkpoint ); précédent : 001E74; suivant : 001E76

On the improvement of Wiener attack on RSA with small private exponent.

Auteurs : Mu-En Wu [Taïwan] ; Chien-Ming Chen [République populaire de Chine] ; Yue-Hsun Lin [États-Unis] ; Hung-Min Sun [Taïwan]

Source :

RBID : pubmed:24982974

Descripteurs français

English descriptors

Abstract

RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaustive search is 2r + 8 bits when extending the Weiner's boundary r bits. In this paper, we first reduce the cost of exhaustive search from 2r + 8 bits to 2r + 2 bits. Then, we propose a method named EPF. With EPF, the cost of exhaustive search is further reduced to 2r - 6 bits when we extend Weiner's boundary r bits. It means that our result is 2(14) times faster than Verheul and van Tilborg's result. Besides, the security boundary is extended 7 bits.

DOI: 10.1155/2014/650537
PubMed: 24982974


Affiliations:


Links toward previous steps (curation, corpus...)


Links to Exploration step

pubmed:24982974

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">On the improvement of Wiener attack on RSA with small private exponent.</title>
<author>
<name sortKey="Wu, Mu En" sort="Wu, Mu En" uniqKey="Wu M" first="Mu-En" last="Wu">Mu-En Wu</name>
<affiliation wicri:level="1">
<nlm:affiliation>Department of Mathematics, Soochow University, Taipei, Taiwan.</nlm:affiliation>
<country xml:lang="fr">Taïwan</country>
<wicri:regionArea>Department of Mathematics, Soochow University, Taipei</wicri:regionArea>
<wicri:noRegion>Taipei</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Chen, Chien Ming" sort="Chen, Chien Ming" uniqKey="Chen C" first="Chien-Ming" last="Chen">Chien-Ming Chen</name>
<affiliation wicri:level="3">
<nlm:affiliation>School of Computer Science and Technology, Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China ; Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen, China.</nlm:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Computer Science and Technology, Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China ; Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen</wicri:regionArea>
<placeName>
<settlement type="city">Shenzhen</settlement>
<region type="province">Guangdong</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Lin, Yue Hsun" sort="Lin, Yue Hsun" uniqKey="Lin Y" first="Yue-Hsun" last="Lin">Yue-Hsun Lin</name>
<affiliation wicri:level="4">
<nlm:affiliation>CyLab, Carnegie Mellon University, Pittsburgh, PA 15213, USA.</nlm:affiliation>
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>CyLab, Carnegie Mellon University, Pittsburgh, PA 15213</wicri:regionArea>
<placeName>
<region type="state">Pennsylvanie</region>
<settlement type="city">Pittsburgh</settlement>
</placeName>
<orgName type="university">Université Carnegie-Mellon</orgName>
</affiliation>
</author>
<author>
<name sortKey="Sun, Hung Min" sort="Sun, Hung Min" uniqKey="Sun H" first="Hung-Min" last="Sun">Hung-Min Sun</name>
<affiliation wicri:level="1">
<nlm:affiliation>Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan.</nlm:affiliation>
<country xml:lang="fr">Taïwan</country>
<wicri:regionArea>Department of Computer Science, National Tsing Hua University, Hsinchu</wicri:regionArea>
<wicri:noRegion>Hsinchu</wicri:noRegion>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PubMed</idno>
<date when="2014">2014</date>
<idno type="RBID">pubmed:24982974</idno>
<idno type="pmid">24982974</idno>
<idno type="doi">10.1155/2014/650537</idno>
<idno type="wicri:Area/PubMed/Corpus">003E66</idno>
<idno type="wicri:explorRef" wicri:stream="PubMed" wicri:step="Corpus" wicri:corpus="PubMed">003E66</idno>
<idno type="wicri:Area/PubMed/Curation">003E39</idno>
<idno type="wicri:explorRef" wicri:stream="PubMed" wicri:step="Curation">003E39</idno>
<idno type="wicri:Area/PubMed/Checkpoint">003E39</idno>
<idno type="wicri:explorRef" wicri:stream="Checkpoint" wicri:step="PubMed">003E39</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en">On the improvement of Wiener attack on RSA with small private exponent.</title>
<author>
<name sortKey="Wu, Mu En" sort="Wu, Mu En" uniqKey="Wu M" first="Mu-En" last="Wu">Mu-En Wu</name>
<affiliation wicri:level="1">
<nlm:affiliation>Department of Mathematics, Soochow University, Taipei, Taiwan.</nlm:affiliation>
<country xml:lang="fr">Taïwan</country>
<wicri:regionArea>Department of Mathematics, Soochow University, Taipei</wicri:regionArea>
<wicri:noRegion>Taipei</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Chen, Chien Ming" sort="Chen, Chien Ming" uniqKey="Chen C" first="Chien-Ming" last="Chen">Chien-Ming Chen</name>
<affiliation wicri:level="3">
<nlm:affiliation>School of Computer Science and Technology, Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China ; Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen, China.</nlm:affiliation>
<country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Computer Science and Technology, Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China ; Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen</wicri:regionArea>
<placeName>
<settlement type="city">Shenzhen</settlement>
<region type="province">Guangdong</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Lin, Yue Hsun" sort="Lin, Yue Hsun" uniqKey="Lin Y" first="Yue-Hsun" last="Lin">Yue-Hsun Lin</name>
<affiliation wicri:level="4">
<nlm:affiliation>CyLab, Carnegie Mellon University, Pittsburgh, PA 15213, USA.</nlm:affiliation>
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>CyLab, Carnegie Mellon University, Pittsburgh, PA 15213</wicri:regionArea>
<placeName>
<region type="state">Pennsylvanie</region>
<settlement type="city">Pittsburgh</settlement>
</placeName>
<orgName type="university">Université Carnegie-Mellon</orgName>
</affiliation>
</author>
<author>
<name sortKey="Sun, Hung Min" sort="Sun, Hung Min" uniqKey="Sun H" first="Hung-Min" last="Sun">Hung-Min Sun</name>
<affiliation wicri:level="1">
<nlm:affiliation>Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan.</nlm:affiliation>
<country xml:lang="fr">Taïwan</country>
<wicri:regionArea>Department of Computer Science, National Tsing Hua University, Hsinchu</wicri:regionArea>
<wicri:noRegion>Hsinchu</wicri:noRegion>
</affiliation>
</author>
</analytic>
<series>
<title level="j">TheScientificWorldJournal</title>
<idno type="eISSN">1537-744X</idno>
<imprint>
<date when="2014" type="published">2014</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Algorithms</term>
<term>Models, Theoretical</term>
</keywords>
<keywords scheme="KwdFr" xml:lang="fr">
<term>Algorithmes</term>
<term>Modèles théoriques</term>
</keywords>
<keywords scheme="MESH" xml:lang="en">
<term>Algorithms</term>
<term>Models, Theoretical</term>
</keywords>
<keywords scheme="MESH" xml:lang="fr">
<term>Algorithmes</term>
<term>Modèles théoriques</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaustive search is 2r + 8 bits when extending the Weiner's boundary r bits. In this paper, we first reduce the cost of exhaustive search from 2r + 8 bits to 2r + 2 bits. Then, we propose a method named EPF. With EPF, the cost of exhaustive search is further reduced to 2r - 6 bits when we extend Weiner's boundary r bits. It means that our result is 2(14) times faster than Verheul and van Tilborg's result. Besides, the security boundary is extended 7 bits.</div>
</front>
</TEI>
<pubmed>
<MedlineCitation Status="MEDLINE" Owner="NLM">
<PMID Version="1">24982974</PMID>
<DateCreated>
<Year>2014</Year>
<Month>07</Month>
<Day>01</Day>
</DateCreated>
<DateCompleted>
<Year>2014</Year>
<Month>10</Month>
<Day>28</Day>
</DateCompleted>
<DateRevised>
<Year>2015</Year>
<Month>08</Month>
<Day>05</Day>
</DateRevised>
<Article PubModel="Print-Electronic">
<Journal>
<ISSN IssnType="Electronic">1537-744X</ISSN>
<JournalIssue CitedMedium="Internet">
<Volume>2014</Volume>
<PubDate>
<Year>2014</Year>
</PubDate>
</JournalIssue>
<Title>TheScientificWorldJournal</Title>
<ISOAbbreviation>ScientificWorldJournal</ISOAbbreviation>
</Journal>
<ArticleTitle>On the improvement of Wiener attack on RSA with small private exponent.</ArticleTitle>
<Pagination>
<MedlinePgn>650537</MedlinePgn>
</Pagination>
<ELocationID EIdType="doi" ValidYN="Y">10.1155/2014/650537</ELocationID>
<Abstract>
<AbstractText>RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaustive search is 2r + 8 bits when extending the Weiner's boundary r bits. In this paper, we first reduce the cost of exhaustive search from 2r + 8 bits to 2r + 2 bits. Then, we propose a method named EPF. With EPF, the cost of exhaustive search is further reduced to 2r - 6 bits when we extend Weiner's boundary r bits. It means that our result is 2(14) times faster than Verheul and van Tilborg's result. Besides, the security boundary is extended 7 bits.</AbstractText>
</Abstract>
<AuthorList CompleteYN="Y">
<Author ValidYN="Y">
<LastName>Wu</LastName>
<ForeName>Mu-En</ForeName>
<Initials>ME</Initials>
<Identifier Source="ORCID">0000-0002-4839-3849</Identifier>
<AffiliationInfo>
<Affiliation>Department of Mathematics, Soochow University, Taipei, Taiwan.</Affiliation>
</AffiliationInfo>
</Author>
<Author ValidYN="Y">
<LastName>Chen</LastName>
<ForeName>Chien-Ming</ForeName>
<Initials>CM</Initials>
<AffiliationInfo>
<Affiliation>School of Computer Science and Technology, Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China ; Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen, China.</Affiliation>
</AffiliationInfo>
</Author>
<Author ValidYN="Y">
<LastName>Lin</LastName>
<ForeName>Yue-Hsun</ForeName>
<Initials>YH</Initials>
<AffiliationInfo>
<Affiliation>CyLab, Carnegie Mellon University, Pittsburgh, PA 15213, USA.</Affiliation>
</AffiliationInfo>
</Author>
<Author ValidYN="Y">
<LastName>Sun</LastName>
<ForeName>Hung-Min</ForeName>
<Initials>HM</Initials>
<Identifier Source="ORCID">0000-0003-0870-9973</Identifier>
<AffiliationInfo>
<Affiliation>Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan.</Affiliation>
</AffiliationInfo>
</Author>
</AuthorList>
<Language>eng</Language>
<PublicationTypeList>
<PublicationType UI="D016428">Journal Article</PublicationType>
<PublicationType UI="D013485">Research Support, Non-U.S. Gov't</PublicationType>
</PublicationTypeList>
<ArticleDate DateType="Electronic">
<Year>2014</Year>
<Month>03</Month>
<Day>27</Day>
</ArticleDate>
</Article>
<MedlineJournalInfo>
<Country>United States</Country>
<MedlineTA>ScientificWorldJournal</MedlineTA>
<NlmUniqueID>101131163</NlmUniqueID>
<ISSNLinking>1537-744X</ISSNLinking>
</MedlineJournalInfo>
<CitationSubset>IM</CitationSubset>
<CommentsCorrectionsList>
<CommentsCorrections RefType="Cites">
<RefSource>ScientificWorldJournal. 2013;2013:860621</RefSource>
<PMID Version="1">24078798</PMID>
</CommentsCorrections>
</CommentsCorrectionsList>
<MeshHeadingList>
<MeshHeading>
<DescriptorName UI="D000465" MajorTopicYN="N">Algorithms</DescriptorName>
</MeshHeading>
<MeshHeading>
<DescriptorName UI="D008962" MajorTopicYN="Y">Models, Theoretical</DescriptorName>
</MeshHeading>
</MeshHeadingList>
<OtherID Source="NLM">PMC3985315</OtherID>
</MedlineCitation>
<PubmedData>
<History>
<PubMedPubDate PubStatus="received">
<Year>2014</Year>
<Month>02</Month>
<Day>07</Day>
</PubMedPubDate>
<PubMedPubDate PubStatus="accepted">
<Year>2014</Year>
<Month>02</Month>
<Day>27</Day>
</PubMedPubDate>
<PubMedPubDate PubStatus="entrez">
<Year>2014</Year>
<Month>7</Month>
<Day>2</Day>
<Hour>6</Hour>
<Minute>0</Minute>
</PubMedPubDate>
<PubMedPubDate PubStatus="pubmed">
<Year>2014</Year>
<Month>7</Month>
<Day>2</Day>
<Hour>6</Hour>
<Minute>0</Minute>
</PubMedPubDate>
<PubMedPubDate PubStatus="medline">
<Year>2014</Year>
<Month>10</Month>
<Day>29</Day>
<Hour>6</Hour>
<Minute>0</Minute>
</PubMedPubDate>
</History>
<PublicationStatus>ppublish</PublicationStatus>
<ArticleIdList>
<ArticleId IdType="pubmed">24982974</ArticleId>
<ArticleId IdType="doi">10.1155/2014/650537</ArticleId>
<ArticleId IdType="pmc">PMC3985315</ArticleId>
</ArticleIdList>
</PubmedData>
</pubmed>
<affiliations>
<list>
<country>
<li>République populaire de Chine</li>
<li>Taïwan</li>
<li>États-Unis</li>
</country>
<region>
<li>Guangdong</li>
<li>Pennsylvanie</li>
</region>
<settlement>
<li>Pittsburgh</li>
<li>Shenzhen</li>
</settlement>
<orgName>
<li>Université Carnegie-Mellon</li>
</orgName>
</list>
<tree>
<country name="Taïwan">
<noRegion>
<name sortKey="Wu, Mu En" sort="Wu, Mu En" uniqKey="Wu M" first="Mu-En" last="Wu">Mu-En Wu</name>
</noRegion>
<name sortKey="Sun, Hung Min" sort="Sun, Hung Min" uniqKey="Sun H" first="Hung-Min" last="Sun">Hung-Min Sun</name>
</country>
<country name="République populaire de Chine">
<region name="Guangdong">
<name sortKey="Chen, Chien Ming" sort="Chen, Chien Ming" uniqKey="Chen C" first="Chien-Ming" last="Chen">Chien-Ming Chen</name>
</region>
</country>
<country name="États-Unis">
<region name="Pennsylvanie">
<name sortKey="Lin, Yue Hsun" sort="Lin, Yue Hsun" uniqKey="Lin Y" first="Yue-Hsun" last="Lin">Yue-Hsun Lin</name>
</region>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Amérique/explor/PittsburghV1/Data/PubMed/Checkpoint
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001E75 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PubMed/Checkpoint/biblio.hfd -nk 001E75 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Amérique
   |area=    PittsburghV1
   |flux=    PubMed
   |étape=   Checkpoint
   |type=    RBID
   |clé=     pubmed:24982974
   |texte=   On the improvement of Wiener attack on RSA with small private exponent.
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/PubMed/Checkpoint/RBID.i   -Sk "pubmed:24982974" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/PubMed/Checkpoint/biblio.hfd   \
       | NlmPubMed2Wicri -a PittsburghV1 

Wicri

This area was generated with Dilib version V0.6.38.
Data generation: Fri Jun 18 17:37:45 2021. Site generation: Fri Jun 18 18:15:47 2021