Abstract
The modulus of type is often used in many variants of factoring-based cryptosystems due to its ability to fasten the decryption process. Faster decryption is suitable for securing small devices in the Internet of Things (IoT) environment or securing fast-forwarding encryption services used in mobile applications. Taking this into account, the security analysis of such modulus is indeed paramount. This paper presents two cryptanalyses that use new enabling conditions to factor the modulus of the factoring-based cryptosystem. The first cryptanalysis considers a single user with a public key pair related via an arbitrary relation to equation , where are unknown parameters. The second cryptanalysis considers two distinct cases in the situation of k-users (i.e., multiple users) for , given the instances of where . By using the lattice basis reduction algorithm for solving simultaneous Diophantine approximation, the k-instances of can be successfully factored in polynomial time.
1. Introduction
The integration of digital and physical realms has advanced considerably during the previous decade, resulting in the Internet of Things (IoT). The IoT is frequently viewed as a paradigm shift from the standard Internet to environments connected to everything. The advancement of technology incorporated in heterogeneous devices, such as smartphones, tablets, radio-frequency identification (RFID), Wifi, smart cities, and smart homes enables all types of communications, even unlawful ones. These connected gadgets equipped with actuators or sensors can detect their surroundings, comprehend current events, and act appropriately, resulting in increased data transfers, as [1] points out.
Individuals have been adapting to the IoT ecosystem without realizing that all the data stored, transferred, and processed in the network are not primarily designed with security aspects [2]. Henceforth, this causes more security and privacy risks for the users of these devices, which is currently one of the significant challenges of the IoT, also allowing the ecosystem to be susceptible and prone to many threats and security attacks [3]. Additionally, IoT devices are frequently limited in computing power, energy, and memory capacity, and the prototypical Internet protocols and cryptography algorithms lack many of these resources, potentially making them inadmissible for IoT devices [4].
Several security properties and requirements may need to be satisfied in order to secure the IoT. These general security properties have also been classified into four categories: confidentiality, integrity, authentication, and authorization. Likewise, as mentioned in [5], the security properties that should be considered with the security protocols for IoT are described in the Table 1 as follows.
Table 1.
Basic security properties for IoT.
Developing a cryptographic algorithm is the utmost priority to retain a user’s privacy in IoT’s security issues, explicitly in authentication and data integrity. In order to encrypt the end-to-end messages, either asymmetric cryptography or symmetric cryptography will be implemented. Both techniques can be used to ensure data security in IoT. Recently, the refs. [6,7] independently investigated the symmetric encryption schemes to secure the IoT platform. By contrast, a few studies have been conducted involving asymmetric encryption schemes. The ref. [8] employed a keyword search using public-key encryption in a cloud environment, which focuses on cloud computing popularization, a diversified industry, and personal choices. In the same environment, the ref. [9] proposed a dynamical scheme based on an Efficient and non-shareable Public Key Exponent Secure Scheme (ENPKESS) via a non-linear Diophantine equation on cloud-based security. Besides, the ref. [10] implemented an equality test, which is significantly secure and indistinguishable against the random oracle of the specified model discussed in their studies. To another extent, the ref. [11] designed asymmetric cryptographic functions by employing the generative adversarial neural networks in IoT settings.
The necessity of keeping information private cannot be overstated, particularly in today’s competitive environment, where eavesdroppers are ubiquitous in our communication channels. Thus, we are encouraged to utilise sophisticated encryption algorithms to protect our communication system’s security. Until the 1970s, symmetrical methods for communication security were used, where the same key was utilised for both encryption and decryption. In 1978, Rivest, Shamir and Adleman (RSA) [12] had introduced the first workable asymmetric cryptosystem. In the RSA cryptosystem, two primes p and q of the same bit-size produces the modulus . At the same time, the public exponent, e is a positive integer relatively prime to a parameter , and d is a private exponent used for decryption to satisfy the Diophantine equation .
The use of the small private exponent d was an early idea in the RSA cryptosystem to lower the computing costs of decryption. Consequently, the total number of modular multiplications needed in the modular exponentiation and overall decryption costs is reduced. Even though RSA is still relatively secure when used with correct cryptographic techniques, the literature on its cryptanalysis is quite extensive. Since then, this system is undoubtedly the most researched topic in cryptology research. For instance, a classical result in [13] shows that if the decryption exponent d is less than , then using continued fractions, the RSA cryptosystem is insecure. Later, ref. [14] revised the bound to via Coppersmith’s method [15] for finding small solutions of modular univariate polynomials. The ref. [16] later discovered that it is feasible to increase the bound of to . The new bound is partially derived from the restriction that both primes p and q have the same bit length.
In recent years, many researchers have extended Wiener’s and Boneh-Durfee’s results. For instance, the ref. [17] presented the type of attacks zoomed into the RSA Diophantine equation in its original form of , focusing on increasing the bound of d, which combines the continued fraction expansion. Instead of deriving an equation from the RSA key equation in its original, the ref. [18] utilized an arbitrary Diophantine equation in the form of . Furthermore, their proposed conditions upon parameters have no relation between the parameters X and Y and the parameters d and . As a result, their strategy enables factoring modulus for a set of weak keys with . The ref. [19] then revisited Wiener’s continued fraction technique. Thus, a new attack against RSA is proposed. In contrast to the conclusion of [14] where , their technique is well-suited to the circumstance when e is substantially less than N. Consequently, when the public key exponent is substantially less than the RSA modulus, the new attack in [19] surpasses the best current attack.
Many RSA variations have been proposed in parallel with these efforts to ensure computational performance while retaining acceptable security levels. There are respective variants of RSA that are established on the moduli, having the form . Such a modulus is widely employed in cryptography, as explained in [20], representing one of the most critical instances. One such prominent variant is proposed in [21], which applied the Hensel-lifting technique to verify a faster decryption algorithm compared to the original RSA decryption procedure. Other cryptosystems that also employed the modulus of the form were designed in [22,23,24]. In comparison to the conventional RSA, their experiments were successful in demonstrating reduced computing costs.
Consequently, the security analysis of becomes essential. For instance, the ref. [25] has proved that the cryptosystem that used is vulnerable if coupled with a decryption exponent d, which is upper-bounded by . Unlike [25], who solved , the ref. [26] solved , which is a more generic equation. Their results increase the number of possible solutions to the problem. Intuitively, the technique in [26] appears to have a better probability of discovering solutions, that is, factoring the modulus N. Successful cryptanalysis for the modulus that is linked to partial key exposure was published very recently in [27,28]. They employed Jochemsz and May’s comprehensive approach [29], which is a highly successful methodology for finding small roots of integer polynomials and, as a result, factoring the modulus N. Despite the advantages of using the modulus , it is susceptible to attackers if the primes share some of their least significant bits (LSBs), as explained in [27], or if the primes and private keys share some of their most significant bits (MSBs), as described in [28].
To demonstrate that the class of keys is indeed weak, we must establish the existence of a probabilistic polynomial-time algorithm that accepts public parameters as input and returns the factors p and q. Thus, the procedure may be used to determine whether the key belongs to the relevant weak class. This trait may be advantageous when designing a cryptosystem’s key generation procedure to avoid mistakenly creating a weak key. The suggested approach may be beneficial in designing a cryptosystem’s key generation process to guarantee that no weak key is created accidentally.
Our contribution. In this paper, we introduce two interesting findings of cryptanalysis of moduli in the form . Firstly, we consider the solution on the public key pair that is related via an arbitrary relation to equation , where are unknown parameters. We present a strategy by applying the continued fraction expansion to factor primes p and q, given public key pairs , which satisfy the following enabling conditions; and . Furthermore, we show that there exists a significant number of factorizable key pairs that fall under our first cryptanalysis.
Secondly, we consider the security of k-users (i.e., multiple users) for , given the instances of where . There are two distinct cases to be considered in the second cryptanalysis. Case number one is about solving k-instances for fixed integer , satisfying , where the parameter will be defined later. Similarly, on the case number two, the analysis worked on fixed integer , satisfying , where the parameter will be defined later. In the second cryptanalysis, we convert the equations into a simultaneous Diophantine problem and use lattice basis reduction techniques to obtain parameters or in both situations. This gives us a good estimate of , allowing us to calculate the prime factors and of each modulus . We further show that, in both situations, the suggested approach allows one to factor k-moduli of the form at the same time.
Organization of the article. We begin with a brief review of the continuous fractions expansion, lattice basis reduction, and simultaneous Diophantine approximation techniques discussed in Section 2. Section 3 shows the results and details the discussion. The first cryptanalysis is presented in Section 3.1, together with the estimation of the number of weak exponents. Following that, Section 3.2 discusses the second cryptanalysis. The examples are presented to illustrate the achieved outcomes. Section 4 compares our findings against relevant and significant previous findings corresponding to their enabling conditions. Section 5 summarises our findings and suggests intriguing future work.
2. Mathematical Foundation
In this section, we give brief reviews on Legendre’s theorem of continued fractions expansion and simultaneous Diophantine approximation via lattice reduction that will be used throughout this paper.
2.1. Continued Fraction Expansion
Let be the continued fraction expansion of . If is a rational number, then the process of listing the continued fractions expansion will finish in some finite index n (i.e., ). In recent years, there has been an increasing amount of work on using the continued fraction expansion, for instance, [17,30], as a tool for analysing the security of public key cryptosystems. An important result on continued fractions is due to the following theorem, widely known as Legendre’s theorem.
Theorem 1
([31]). Suppose χ is a rational number. Let r and s be integers where and , such that , then is a convergent of χ.
2.2. Simultaneous Diophantine Approximations
Let be d linearly independent vectors of with . The set of all integer linear combinations of the vectors is called a lattice, and is in the form
The set is the basis of , and its dimension is d. The determinant of is defined as , where U is the matrix of the ’s in the canonical basis of . Define the Euclidean norm of a vector as . Define the Euclidean norm of a vector as . Finding a short non-zero vector in is a crucial problem in lattice reduction. The LLL algorithm generates a reduced basis vector [32], and the following result fixes the reduced basis vector’s sizes (see [20]).
Theorem 2
([32]). Let be a lattice of dimension ω with a basis . The LLL algorithm produces a reduced basis satisfying
for all 1 .
The simultaneous Diophantine approximations problem, which is stated as follows, is one of the most significant applications of the LLL algorithm. Let be n real numbers, and a real number such that . Dirichlet’s classical theorem states that integers exist , and a positive integer , such that for . The LLL algorithm described a method for finding simultaneous Diophantine approximations to rational numbers using a lattice with real number elements [32]. In [33] (Appendix A), a comparable solution for a lattice with integer elements is provided.
Theorem 3
([33]). There is a polynomial time algorithm for given rational numbers and , to compute integers and a positive integer q, such that
3. Results and Discussion
In this section, we present our first cryptanalysis which focuses on a single public key pair , that is related via an arbitrary relation to equation , where and are unknown parameters.
3.1. The First Cryptanalysis
Suppose that for with , then holds [27], unless stated otherwise, and this relation defines the integer N throughout this work. Let be the integer that is closest to x. Let’s start with the lemma below.
Lemma 1.
Let where are suitable small integers with . Let Δ be an approximation of such that , then .
Proof.
Set with . Consider the following equation.
By using the identity , we can rewrite the equation as
Since and , hence
Divide both sides by , hence . It follows that . □
Theorem 4.
Let with . Let be suitably small integers, such that . Let e satisfying the equation with . If and , then N can be factored in polynomial time.
Proof.
Suppose that a public key pair satisfies an arbitrary equation
with . Suppose , thus, . Rearrange (1) as , and dividing both sides by , we have
If the condition holds, we can infer that is a convergent of the continuing fraction using Theorem 1. Observe that, this is equivalent to . From Lemma 1, we have with . This implies that
We can see from (2) that this requirement is satisfied for . As a result, we may deduce that is a convergent of the continuing fraction . Following that, we define . By Lemma 1, is a satisfactory approximation of , hence this implies that . It follows that , hence . □
3.1.1. The Uniqueness of Paramaters and t for Which the Theorem 4 Applies
Let’s start with the following result. It proves that given fixed integers and , the public parameter satisfies, at most, one equation , where the unknown parameters and t satisfy the conditions of Theorem 4.
Proposition 1.
Let e satisfying with and . Let , and . Then and .
3.1.2. Counting the Number of e’s for Which the Theorem 4 Applies
The number of e’s that fulfil the arbitrary equation is estimated in the following result.
Theorem 5.
Let e satisfy an arbitrary equation , where are integers satisfying with . Then, the number of the parameter e’s is at least , where is suitably small for large N.
Proof.
Suppose r and s are two integers satisfying and . From , we have . Define with . Hence, there exists an integer t such that is also an integer. Let , thus . The number of the parameter e’s, denoted by , satisfying the conditions given in Theorem 4 is
where for some positive constants . Observe the following.
where is a constant (see [31], Theorem 328). Substitute (6) in (5), we obtain
Next, for , we have
3.1.3. Numerical Illustration of the First Cryptanalysis
Suppose we are given a public key pairs and satisfy all the condition stated in Theorem 4. At first, we compute the continued fraction of , and the list of the first convergents of the continued fraction expansion are
Observe that we may omit the first and second convergents. Furthermore, the convergents and give , respectively. We proceed with the next convergent , then we compute , hence . Finally, we compute , which leads to the factorization of N (i.e., and ).
The above illustration can also be viewed as the following algorithm.
| Algorithm 1 Factoring public key pairs which satisfy Theorem 4. |
Input: A public key pair . Output: The prime factors .
|
3.2. The Second Cryptanalysis
In this section, we consider the security of k-users (i.e., multiple users) for , given the instances of where . By using the lattice basis reduction algorithm for solving simultaneous Diophantine approximation, the k-instances of public key pairs can be factored in polynomial time.
3.2.1. The Second Cryptanalysis: Case #1
Suppose that we are given k-instances for fixed integer r, satisfying . The following Theorem 6 proves that we are able to factor in such moduli if the unknown parameters r, , and satisfy the given conditions.
Theorem 6.
Let i be integers such that for . Suppose are k-public exponents and are k-moduli, each with the same bit-size N where . Let α, β be suitably small integers with such that where . Define . If there exists a fixed integer , k-integers and satisfying the equation , then k-moduli of the form can be factored in polynomial time.
Proof.
Let , and , where and . Thus, . Let with . Consider the equation . We rearranged the equation and divided by for both sides, and obtained the following;
To show the existence of integer r and , let , . We have
Since for , thus Theorem 3 gives . It follows that if , then . Hence, for , we obtain and . If the requirements of Theorem 3 are fulfilled, we will be able to calculate r and for .
Next, observe the equation . If , then from Lemma 1 and Theorem 4, is an approximation of . Hence, this implies that for . Finally, we compute . Therefore, k-moduli of the form can be factored in polynomial time. □
3.2.2. Numerical Illustration of the Second Cryptanalysis: Case #1
As an illustration of our second cryptanalysis for Case , suppose we consider three pairs of public keys, as follows.
Observe that . Supposing and , we obtain and . Suppose that we consider the parameter C as defined in [33], (Appendix A, page 196) using , hence we have
Suppose that the lattice is spanned by the following matrix:
After applying the LLL algorithm to , the following matrix is obtained as a reduced basis.
Now, computing , we have
According to the first row of the above matrix, we obtain , , and . By applying r and for , we define as an approximation of , respectively. Hence, by using Lemma 1 and Theorem 4, this implies that for . Thus, we have the following;
Next, for each , we compute the following;
This leads us to the factorization of three RSA-Takagi moduli and , where
Hence, by using Lemma 1 and Theorem 4, for each , this implies that . Hence, which we obtain . This results in the factorization of three moduli and with , respectively.
3.2.3. The Second Cryptanalysis: Case #2
In this section, we consider the Case that is when k-moduli of the form satisfy k-equations of the form , where the parameters , s, and are suitably small unknown parameters. This analysis is for the fixed value of s instead of fixed value of r from Case . Thus, the following theorem is looking for k-integers of and an integer s.
Theorem 7.
Let i be integers such that for . Suppose be k-public exponents with and be k-moduli, each with the same bit-size N, where . Let α, β be suitably small integers with such that where . Define . If there exists a fixed integer , k-integers and satisfy the equation , then k-moduli of the form can be factored in polynomial time.
Proof.
Let be k-public exponents with and where for . Let , where . Suppose that , where . Observe that . Consider the equation . Rearranging the equation and dividing by for both sides, we have the following:
We now continue to demonstrate the existence of integers and s. Let and . Then, we obtain
Since for , therefore, Theorem 3 gives . It follows that if , then . Next, for , we have and . If the conditions of Theorem 3 are fulfilled, we will find s and . Next, by rearranging the equation , observe the following equation;
Since , hence, using Lemma 1 and Theorem 4 confirms that such is an approximation of , which implies that . Finally, we compute . Therefore, k-moduli of the form can be factored in. □
3.2.4. Numerical Illustration of the Second Cryptanalysis: Case #2
It should be noted that the numerical illustration can be accomplished in a similar manner and with a slight adjustment with the Case . We consider three moduli and three public exponents to show our second cryptanalysis for Case as follows.
Observe that . We also obtain with . Let and , therefore and . Consider the parameter C as defined in [33] (Appendix A, page 196) using ; hence, we obtain
Suppose that the lattice is spanned by the following matrix:
After applying the LLL algorithm to , the following matrix is obtained as a reduced basis.
Now, computing , we have
We derive , , and from the first row of the aforementioned matrix. By applying s and for , we look at the relation as an approximation of , respectively. Thus, we have the following;
Hence, by using Lemma 1 and Theorem 4, for each , this implies that . Hence, which we obtain . This results in the factorization of three moduli and with , respectively.
4. Comparative Analysis
In this section, we compare our findings against previous findings of security analysis related to concerning the form of the modified key equations and their conditions. The comparisons are illustrated in Table 2.
Table 2.
Comparison of Our Results Against Previous Findings.
From Table 2, based on the references given (i.e., [25,26,27,34,35], we can view that all earlier first five findings are a type of cryptanalysis as a zoomed-in generalized Diophantine equation in the form for suitable integers . The first five findings had to dictate conditions upon the key pairs and its corresponding generalized parameters. All of the mentioned attacks usually combine the continued fraction method, the lattice reduction technique such as the Coppersmith’s method [15] or utilize Jochemsz and May’s strategy [29] to formulate a new strategy in factoring N.
The above collection depicts the progress of cryptanalysis efforts over some time. To continue the research, there might be more generalization key equations that can be provided to emphasize the technique to factor in polynomial time. Hence, this paper presents two new cryptanalyses that depend on an arbitrary Diophantine key equation, which differ from earlier studies.
There are two different results of cryptanalysis of the modulus in the form presented in this paper, which is briefly summarized in Table 2. As a consequence, our strategy enables us to factor for a collection of weak keys with requirements as specified in Theorems 4, 6 and 7, respectively. Thus, our results are novel and essential. The conditions upon our parameters cannot be compared to conditions upon parameters of earlier results. It is due to the proposed results in another addition to the not-to-do list during the key generation process to guarantee that the crypto-designers or implementors do not unawarely construct a weak key.
5. Conclusions and Future Work
The modulus of type is often used in many variants of factoring-based public-key encryption due to its ability to fasten the decryption process. Faster decryption is very suitable for securing small devices in the IoT environment or securing fast-forwarding encryption services used in mobile applications. Taking this into account, the security of those devices is paramount. Finally, two new cryptanalyses of the modulus were presented. This study focused on two cryptanalyses that use new enabling conditions to factor the modulus of the factoring-based cryptosystem. The first cryptanalysis considered a single user with a public key pair related via an arbitrary relation to equation , where are unknown parameters. The second cryptanalysis considered two distinct cases in the situation of k-users (i.e., multiple users) for , given the instances of where . By using the lattice basis reduction algorithm for solving simultaneous Diophantine approximation, the k-instances of can be successfully factored in polynomial time.
It was proven that a probabilistic polynomial-time algorithm exists that takes public parameters as an input and returns the factors p and q. Hence, we executed the procedure to see if the key belonged to the weak class. The proposed results may be helpful during key generation to avoid creating a weak key by accident. This study revealed specific flaws in the relaxed model using faulty public variables and limited parameter selection. These flaws do not compromise the factoring-based cryptosystem’s security. Nevertheless, our findings can help uncover possible flaws and better understand the underlying mathematics and parameter choices.
Future work. Given the resource constraints associated with various IoT devices, cryptographic solutions in this environment must be resilient while remaining practical, posing a challenge for security analysts and crypto designers. Therefore, other generalization key equations can be presented in the future to demonstrate how to recover the prime factors p and q in polynomial time. It would be splendid if a small private exponent could reduce the encryption and decryption time. Under partial key exposure attacks, future researchers can analyze the RSA variant’s security when the prime factor p and q share many LSBs or MSBs. There are other schemes that one might be interested in by using a small private exponent that can be employed to recover the prime factor p and q in polynomial time, such as [27,28].
Author Contributions
Formal analysis, M.A.A., N.N.A.R. and M.R.K.A.; Funding acquisition, M.A.A.; Investigation, M.A.A. and N.N.A.R.; Project administration, M.R.K.A.; Validation, M.A.A., N.N.A.R. and M.R.K.A.; Writing—original draft, M.A.A. and N.N.A.R.; Writing—review and editing, M.A.A., N.N.A.R., M.R.K.A. and N.R.S. All authors have read and agreed to the published version of the manuscript.
Funding
Universiti Putra Malaysia partially supported the present research under PutraGrant—GP/2017/9552200.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations and Mathematical Symbols
The following abbreviations and mathematical symbols are used in this manuscript:
| ENPKESS | Efficient and non-shareable Public Key Exponent Secure Scheme |
| IoT | Internet of Things |
| LLL | Lenstra-Lenstra-Lovasz |
| LSBs | least significant bits |
| MSBs | most significant bits |
| RFID | Radio-frequency Identification |
| RSA | Rivest-Shamir-Adleman |
| Prime Numbers | |
| Set of Integers | |
| Set of Real Numbers | |
| Set of Natural Numbers | |
| Set of Rational Numbers | |
| ≈ | Approximation |
| < | Less than |
| > | Greater than |
| ≤ | Less than and equal to |
| ≥ | Greater than and equal to |
| ∑ | Summation |
| Absolute value (modulus) of | |
| Norm | |
| min | Minimum |
| max | Maximum |
| mod | Modulo |
| Polynomials with One-Variable | |
| gcd | Greatest Common Divisor |
| det | Determinant |
References
- Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. In Proceedings of the 2015 IEEE World Congress on Services—SERVICES 2015, New York, NY, USA, 27 June–2 July 2015; Zhang, L., Bahsoon, R., Eds.; pp. 21–28. [Google Scholar] [CrossRef]
- Chatzigiannakis, I.; Vitaletti, A.; Pyrgelis, A. A Privacy-preserving Smart Parking System using an IoT Elliptic Curve Based Security Platform. Comput. Commun. 2016, 89, 165–177. [Google Scholar] [CrossRef]
- Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the Internet of Things: Perspectives and Challenges. Wirel. Netw. 2014, 20, 2481–2501. [Google Scholar] [CrossRef]
- Samaila, M.; Neto, M.; Fernandes, D.; Freire, M.; Inácio, P. Challenges of Securing Internet of Things Devices: A survey. Secur. Priv. 2018, 1, e20. [Google Scholar] [CrossRef] [Green Version]
- Nguyen, K.T.; Laurent, M.; Oualha, N. Survey on Secure Communication Protocols for The Internet of Things. Ad Hoc Netw. 2015, 32, 17–31. [Google Scholar] [CrossRef]
- Saraiva, D.A.; Leithardt, V.R.Q.; de Paula, D.; Sales Mendes, A.; González, G.V.; Crocker, P. Prisec: Comparison of Symmetric Key Algorithms for IoT Devices. Sensors 2019, 19, 4312. [Google Scholar] [CrossRef] [Green Version]
- Prathiba, A.; Bhaaskaran, V.K. Hardware Footprints of S-box in Lightweight Symmetric Block Ciphers for IoT and CPS Information Security Systems. Integration 2019, 69, 266–278. [Google Scholar] [CrossRef]
- Zhou, Y.; Li, N.; Tian, Y.; An, D.; Wang, L. Public Key Encryption with Keyword Search in Cloud: A Survey. Entropy 2020, 22, 421. [Google Scholar] [CrossRef] [Green Version]
- Thirumalai, C.; Mohan, S.; Srivastava, G. An Efficient Public Key Secure Scheme for Cloud and IoT Security. Comput. Commun. 2020, 150, 634–643. [Google Scholar] [CrossRef]
- Deverajan, G.G.; Muthukumaran, V.; Hsu, C.H.; Karuppiah, M.; Chung, Y.C.; Chen, Y.H. Public key encryption with equality test for Industrial Internet of Things system in cloud computing. Trans. Emerg. Telecommun. Technol. 2021, e4202. [Google Scholar] [CrossRef]
- Hao, X.; Ren, W.; Xiong, R.; Zhu, T.; Choo, K.K.R. Asymmetric Cryptographic Functions Based on Generative Adversarial Neural Networks for Internet of Things. Future Gener. Comput. Syst. 2021, 24, 243–253. [Google Scholar] [CrossRef]
- Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Wiener, M.J. Cryptanalysis of Short RSA Secret Exponents. IEEE Trans. Inf. Theory 1990, 36, 553–558. [Google Scholar] [CrossRef] [Green Version]
- Boneh, D.; Durfee, G. Cryptanalysis of RSA with Private Key d Less Than N0.292. IEEE Trans. Inf. Theory 2000, 46, 1339–1349. [Google Scholar] [CrossRef]
- Coppersmith, D. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. Cryptol. 1997, 10, 233–260. [Google Scholar] [CrossRef] [Green Version]
- Susilo, W.; Tonien, J.; Yang, G. A Generalised Bound for The Wiener Attack on RSA. J. Inf. Secur. Appl. 2020, 53, 102531. [Google Scholar] [CrossRef]
- Ariffin, M.R.K.; Abubakar, S.I.; Yunos, F.; Asbullah, M.A. New Cryptanalytic Attack on RSA Modulus N = pq using Small Prime Difference Method. Cryptography 2019, 3, 2. [Google Scholar] [CrossRef] [Green Version]
- Ghafar, A.H.A.; Ariffin, M.R.K.; Md Yasin, S.; Sapar, S.H. Partial Key Attack Given MSBs of CRT-RSA Private Keys. Mathematics 2020, 8, 2188. [Google Scholar] [CrossRef]
- Susilo, W.; Tonien, J.; Yang, G. Divide and Capture: An Improved Cryptanalysis of the Encryption Standard Algorithm RSA. Comput. Stand. Interfaces 2021, 74, 103470. [Google Scholar] [CrossRef]
- May, A. Secret Exponent Attacks on RSA-type Schemes with Moduli N = prq. In Public Key Cryptography—PKC 2004, Proceedings of the 7th International Workshop on Public Key Cryptography, Singapore, 1–4 March 2004; Bao, F., Deng, R., Zhou, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 218–230. [Google Scholar] [CrossRef] [Green Version]
- Takagi, T. Fast RSA-type Cryptosystem Modulo pkq. In Advances in Cryptology—CRYPTO ’98, Procedings of the 28th Annual International Cryptology Conference—CRYPTO 1998, Santa Barbara, CA, USA, 23–27 August 1998; Krawczyk, H., Ed.; Springer: Berlin/Heidelberg, Germany, 1998; pp. 318–326. [Google Scholar] [CrossRef] [Green Version]
- Batten, L.M.; Williams, H.C. Unique Rabin-Williams Signature Scheme Decryption; Cryptology ePrint Archive, Report 2019/915; International Association for Cryptologic Research: Nevada, CA, USA, 2019; p. 915. [Google Scholar]
- Mooney, D.; Batten, L.M.; Zhang, L.Y. A New Rabin-type Cryptosystem with Modulus p2q. In Proceedings of the 11th International Conference on Applications and Techniques in Information Security—ATIS 2020, Brisbane, QLD, Australia, 12–13 November 2020; Batina, L., Li, G., Eds.; Springer: Singapore, 2020; pp. 61–77. [Google Scholar] [CrossRef]
- Nishioka, M.; Satoh, H.; Sakurai, K. Design and Analysis of Fast Provably Secure Public-key Cryptosystems based on A Modular Squaring. In Proceedings of the 4th International Conference on Information Security and Cryptology—ICISC 2001, Seoul, Korea, 6–7 December 2001; Kim, K., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; pp. 81–102. [Google Scholar] [CrossRef]
- Sarkar, S. Small Secret Exponent Attack on RSA Variant with Modulus N = prq. Des. Codes Cryptogr. 2014, 73, 383–392. [Google Scholar] [CrossRef]
- Nitaj, A.; Rachidi, T. New Attacks on RSA with Moduli N = prq. In Proceedings of the First International Conference on Codes, Cryptology, and Information Security—C2SI 2015, Rabat, Morocco, 26–28 May 2015; El Hajji, S., Nitaj, A., Carlet, C., Souidi, E., Eds.; Springer: Cham, Switzerland, 2015; pp. 352–360. [Google Scholar] [CrossRef] [Green Version]
- Adenan, N.N.H.; Ariffin, M.R.K.; Yunos, F.; Sapar, S.H.; Asbullah, M.A. Analytical Cryptanalysis upon N = p2q utilizing Jochemsz-May Strategy. PLoS ONE 2021, 16, e0248888. [Google Scholar] [CrossRef]
- Adenan, N.N.H.; Ariffin, M.R.K.; Sapar, S.H.; Ghafar, A.H.A.; Asbullah, M.A. New Jochemsz–May Cryptanalytic Bound for RSA System utilizing Common Modulus N = p2q. Mathematics 2021, 9, 340. [Google Scholar] [CrossRef]
- Jochemsz, E.; May, A. A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. In Advances in Cryptology—ASIACRYPT 2006, Proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security—ASIACRYPT 2006; Shanghai, China, 3–7 December 2006, Lai, X., Chen, K., Eds.; Springer: Berlin/Heidelberg, Germany, 2006; pp. 267–282. [Google Scholar] [CrossRef] [Green Version]
- Wu, M.E.; Tso, R.; Sun, H.M. On the Improvement of Fermat Factorization using a Continued Fraction Technique. Future Gener. Comput. Syst. 2014, 30, 162–168. [Google Scholar] [CrossRef]
- Hardy, G.H.; Wright, E.M. An Introduction to the Theory Numbers, 5th ed.; The Clarendon Press; Oxford University Press: New York, NY, USA, 1979; ISBN 978-0-19-853171-5. [Google Scholar]
- Lenstra, A.K.; Lenstra, H.W.; Lovász, L. Factoring polynomials with rational coefficients. Math. Ann. 1982, 261, 515–534. [Google Scholar] [CrossRef]
- Nitaj, A.; Ariffin, M.R.K.; Nassr, D.I.; Bahig, H.M. New attacks on the RSA cryptosystem. In Proceedings of the 7th International Conference on Cryptology in Africa—AFRICACRYPT 2014, Marrakesh, Morocco, 28–30 May 2014; Pointcheval, D., Vergnaud, D., Eds.; Springer: Cham, Switzerland, 2014; pp. 178–198. [Google Scholar] [CrossRef] [Green Version]
- Asbullah, M.A.; Ariffin, M.R.K. New Attacks on RSA with Modulus N = p2q using Continued Fractions. J. Phys. Conf. Ser. 2015, 622, 012019. [Google Scholar] [CrossRef] [Green Version]
- Rahman, N.N.A.; Ariffin, M.R.K.; Asbullah, M.A. Successful Cryptanalysis upon a Generalized RSA Key Equation. ASM Sci. J. 2019, 12, 191–202. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).