How to Generalize RSA Cryptanalyses Atsushi Takayasu and Noboru - - PowerPoint PPT Presentation

β–Ά
how to generalize rsa cryptanalyses
SMART_READER_LITE
LIVE PREVIEW

How to Generalize RSA Cryptanalyses Atsushi Takayasu and Noboru - - PowerPoint PPT Presentation

PKC2016@Taipei How to Generalize RSA Cryptanalyses Atsushi Takayasu and Noboru Kunihiro The University of Tokyo, Japan AIST, Japan 1/19 Background 2 /19 RSA Public key: , Secret key: (, , ) Key generation: =


slide-1
SLIDE 1

How to Generalize RSA Cryptanalyses

Atsushi Takayasu and Noboru Kunihiro The University of Tokyo, Japan AIST, Japan

PKC2016@Taipei

1/19

slide-2
SLIDE 2

Background

2 /19

slide-3
SLIDE 3

RSA

Public key: 𝑂, 𝑓 Secret key: (π‘ž, π‘Ÿ, 𝑒) Key generation: 𝑂 = π‘žπ‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) οƒΌ One of the most famous cryptosystems οƒΌ A number of paper study the security.

3 /19

slide-4
SLIDE 4

Known Attacks on RSA

  • Small secret exponent attack: [BD00]

Small secret exponent

𝑒 < 𝑂0.292 disclose the factorization of 𝑂.

  • Partial key exposure attacks: [EJMW05], [TK14]

The most/least significant bits of 𝑒 disclose the factorization of 𝑂. οƒΌ These attacks are based on Coppersmith’s method.

4 /19

slide-5
SLIDE 5

Variants of RSA

RSA Takagi RSA Prime Power RSA PK

𝑂, 𝑓 𝑂, 𝑓 𝑂, 𝑓

SK

(π‘ž, π‘Ÿ, 𝑒) (π‘ž, π‘Ÿ, 𝑒) (π‘ž, π‘Ÿ, 𝑒)

KG 𝑂 = π‘žπ‘Ÿ 𝑂 = π‘žπ‘ π‘Ÿ 𝑂 = π‘žπ‘ π‘Ÿ 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑓𝑒 = 1 mod π‘žπ‘ βˆ’1(π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) οƒΌ The variants enable faster decryption using CRT. οƒΌ When 𝑠 = 1, both variants are the same as RSA.

5 /19

slide-6
SLIDE 6

Known Attacks on the Variants

RSA Takagi’s RSA Prime Power RSA Small Secret Exponent [BD00] [IKK08] [May04], [LZPL15], [Sar15] Partial Key Exposure [EJMW05], [TK14] [HHX+14] [May04], [LZPL15], [Sar15], [EKU15] οƒΌ When 𝑠 = 1, only [IKK08] achieves the same bound as the best attacks on RSA.

6 /19

slide-7
SLIDE 7

Open Questions

  • Are there better attacks on the variants that generalize the

best attacks on RSA?

  • [IKK08]’s algorithm construction is very technical and hard

to follow.

7 /19

slide-8
SLIDE 8

Open Questions

  • Are there better attacks on the variants that generalize the

best attacks on RSA?

  • [IKK08]’s algorithm construction is very technical and hard

to follow. Are there easy-to-understand generic transformations that convert the attacks on RSA to Takagi’s RSA and the prime power RSA?

7 /19

slide-9
SLIDE 9

Our Results

We propose transformations for both the Takagi’s RSA and the prime power RSA which are very simple and give improved results. – Simpler analyses of [IKK08], [Sar15] – Better bounds than [HHX+14], [Sar15], [EKU15] – Some evidence of optimality

8 /19

slide-10
SLIDE 10

PKE attacks on Takagi’s RSA (𝑠 = 2)

[HHX+14] Our Improvements

9 /19

log𝑂 𝑒 Exposed proportion of 𝑒

slide-11
SLIDE 11

PKE attacks on Takagi’s RSA (𝑠 = 2)

9 /19

log𝑂 𝑒 [HHX+14] Our Improvements Exposed proportion of 𝑒

slide-12
SLIDE 12

PKE attacks on the prime power RSA (𝑠 = 2)

9 /19

log𝑂 𝑒 [LZPL15] [Sar15] Our Improvements Exposed proportion of 𝑒

slide-13
SLIDE 13

Coppersmith’s Method

10 /19

slide-14
SLIDE 14

Overview [How97]

To find small roots of a bivariate modular equation

β„Ž 𝑦, 𝑧 = 0 mod 𝑓

where 𝑦 < π‘Œ and 𝑧 < Y,

11 /19

slide-15
SLIDE 15

Overview [How97]

To find small roots of a bivariate modular equation

β„Ž 𝑦, 𝑧 = 0 mod 𝑓

where 𝑦 < π‘Œ and 𝑧 < Y,

  • Generate β„Ž1 𝑦, 𝑧 , … , β„Žπ‘œ(𝑦, 𝑧) that have the roots

(𝑦 , 𝑧 ) modulo 𝑓𝑛.

11 /19

slide-16
SLIDE 16

Overview [How97]

To find small roots of a bivariate modular equation

β„Ž 𝑦, 𝑧 = 0 mod 𝑓

where 𝑦 < π‘Œ and 𝑧 < Y,

  • Generate β„Ž1 𝑦, 𝑧 , … , β„Žπ‘œ(𝑦, 𝑧) that have the roots

(𝑦 , 𝑧 ) modulo 𝑓𝑛.

  • If integer linear combinations of β„Ž1 𝑦, 𝑧 , … , β„Žπ‘œ(𝑦, 𝑧)

become β„Ž1

β€² 𝑦, 𝑧 and β„Ž2 β€² (𝑦, 𝑧) satisfying

β„Žπ‘—β€²(π‘¦π‘Œ, 𝑧𝑍) < 𝑓𝑛,

the original roots can be recovered.

11 /19

slide-17
SLIDE 17

LLL Reduction to Find the Polynomials

  • Polynomials β„Ž1

β€² 𝑦, 𝑧 and β„Ž2 β€² (𝑦, 𝑧) that are the integer

linear combinations of β„Ž1 𝑦, 𝑧 , … , β„Žπ‘œ(𝑦, 𝑧) and the norms

  • f β„Žπ‘—β€²(π‘¦π‘Œ, 𝑧𝑍) are small.

12 /19

slide-18
SLIDE 18

LLL Reduction to Find the Polynomials

  • Polynomials β„Ž1

β€² 𝑦, 𝑧 and β„Ž2 β€² (𝑦, 𝑧) that are the integer

linear combinations of β„Ž1 𝑦, 𝑧 , … , β„Žπ‘œ(𝑦, 𝑧) and the norms

  • f β„Žπ‘—β€²(π‘¦π‘Œ, 𝑧𝑍) are small.
  • LLL algorithm can efficiently find short lattice vectors 𝑐1β€²

and 𝑐2β€² that are the integer linear combinations of 𝑐1, …, π‘π‘œ and the Euclidean norms are small.

12 /19

slide-19
SLIDE 19

LLL Reduction to Find the Polynomials

  • Polynomials β„Ž1

β€² 𝑦, 𝑧 and β„Ž2 β€² (𝑦, 𝑧) that are the integer

linear combinations of β„Ž1 𝑦, 𝑧 , … , β„Žπ‘œ(𝑦, 𝑧) and the norms

  • f β„Žπ‘—β€²(π‘¦π‘Œ, 𝑧𝑍) are small.
  • LLL algorithm can efficiently find short lattice vectors 𝑐1β€²

and 𝑐2β€² that are the integer linear combinations of 𝑐1, …, π‘π‘œ and the Euclidean norms are small. οƒΌ Build a lattice whose basis consists of coefficients of β„Ž1 π‘¦π‘Œ, 𝑧𝑍 , … , β„Žπ‘œ(π‘¦π‘Œ, 𝑧𝑍) and apply the LLL.

12 /19

slide-20
SLIDE 20

SSE Attack on RSA [BD00]

𝑂 = π‘žπ‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑔 𝑦, 𝑧 = 1 + 𝑦 𝑂 + 1 + 𝑧 mod 𝑓

whose root (β„“, βˆ’ π‘ž + π‘Ÿ ) discloses the factorization of 𝑂.

  • A bivariate equation with three monomials (1, 𝑦, 𝑦𝑧)

13 /19

slide-21
SLIDE 21

SSE Attack on RSA [BD00]

𝑂 = π‘žπ‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑔 𝑦, 𝑧 = 1 + 𝑦 𝑂 + 1 + 𝑧 mod 𝑓

whose root (β„“, βˆ’ π‘ž + π‘Ÿ ) discloses the factorization of 𝑂. Polynomials

π‘¦π‘—π‘§π‘˜π‘”π‘£ 𝑦, 𝑧 π‘“π‘›βˆ’π‘£ generate a triangular matrix with diagonals π‘Œπ‘—+π‘£π‘π‘˜+π‘£π‘“π‘›βˆ’π‘£.

οƒΌ The resulting lattice constructions are well-analyzed.

13 /19

slide-22
SLIDE 22

SSE Attack on RSA [BD00]

𝑂 = π‘žπ‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑔 𝑦, 𝑧 = 1 + 𝑦 𝑂 + 1 + 𝑧 mod 𝑓

whose root (β„“, βˆ’ π‘ž + π‘Ÿ ) discloses the factorization of 𝑂. Polynomials

π‘¦π‘—π‘§π‘˜π‘”π‘£ 𝑦, 𝑧 π‘“π‘›βˆ’π‘£ generate a triangular matrix with diagonals π‘Œπ‘—+π‘£π‘π‘˜+π‘£π‘“π‘›βˆ’π‘£.

οƒΌ The resulting lattice constructions are well-analyzed.

13 /19

slide-23
SLIDE 23

How to Generalize the Attacks

14 /19

slide-24
SLIDE 24

SSE Attack on Takagi’s RSA

𝑂 = π‘žπ‘ π‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑔 𝑦, 𝑧1, 𝑧2 = 1 + 𝑦 𝑧1 βˆ’ 1 (𝑧2 βˆ’ 1) mod 𝑓

whose root (β„“, π‘ž, π‘Ÿ) discloses the factorization of 𝑂.

  • A trivariate equation with five monomials

(1, 𝑦, 𝑦𝑧1, 𝑦𝑧2, 𝑦𝑧1𝑧2)

  • Nontrivial algebraic relation 𝑧1

𝑠𝑧2 = 𝑂

15 /19

slide-25
SLIDE 25

SSE Attack on Takagi’s RSA

𝑂 = π‘žπ‘ π‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑔 𝑦, 𝑧1, 𝑧2 = 1 + 𝑦 𝑧1 βˆ’ 1 (𝑧2 βˆ’ 1) mod 𝑓

whose root (β„“, π‘ž, π‘Ÿ) discloses the factorization of 𝑂. Polynomials

1, 𝑧2, 𝑧1𝑧2, … , 𝑧1

π‘ βˆ’1𝑧2 β‹… 𝑦𝑗𝑧 1 π‘˜π‘”π‘£ 𝑦, 𝑧1, 𝑧2 π‘“π‘›βˆ’π‘£

generate a triangular matrix with (sizes of ) diagonals 𝑍0, 𝑍1, … , 𝑍𝑠 β‹… π‘Œπ‘—+π‘£π‘π‘˜+π‘£π‘“π‘›βˆ’π‘£.

15 /19

slide-26
SLIDE 26

SSE Attack on Takagi’s RSA

𝑂 = π‘žπ‘ π‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑔 𝑦, 𝑧1, 𝑧2 = 1 + 𝑦 𝑧1 βˆ’ 1 (𝑧2 βˆ’ 1) mod 𝑓

whose root (β„“, π‘ž, π‘Ÿ) discloses the factorization of 𝑂. Polynomials

1, 𝑧2, 𝑧1𝑧2, … , 𝑧1

π‘ βˆ’1𝑧2 β‹… 𝑦𝑗𝑧 1 π‘˜π‘”π‘£ 𝑦, 𝑧1, 𝑧2 π‘“π‘›βˆ’π‘£

generate a triangular matrix with (sizes of ) diagonals 𝑍0, 𝑍1, … , 𝑍𝑠 β‹… π‘Œπ‘—+π‘£π‘π‘˜+π‘£π‘“π‘›βˆ’π‘£.

15 /19

slide-27
SLIDE 27

SSE Attack on the prime power RSA

𝑂 = π‘žπ‘ π‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑔 𝑦, 𝑧1, 𝑧2 = 1 + 𝑦𝑧1

π‘ βˆ’1 𝑧1 βˆ’ 1 (𝑧2 βˆ’ 1) mod 𝑓

whose roots (β„“, π‘ž, π‘Ÿ) offer the factorization of 𝑂.

  • A trivariate equation with five monomials

(1, 𝑦, 𝑦𝑧1

π‘ βˆ’1, 𝑦𝑧1 𝑠, 𝑦𝑧1 π‘ βˆ’1𝑧2)

  • Nontrivial algebraic relation 𝑧1

𝑠𝑧2 = 𝑂

16 /19

slide-28
SLIDE 28

SSE Attack on the prime power RSA

𝑂 = π‘žπ‘ π‘Ÿ and 𝑓𝑒 = 1 mod (π‘ž βˆ’ 1)(π‘Ÿ βˆ’ 1) 𝑔 𝑦, 𝑧1, 𝑧2 = 1 + 𝑦𝑧1

π‘ βˆ’1 𝑧1 βˆ’ 1 (𝑧2 βˆ’ 1) mod 𝑓

whose roots (β„“, π‘ž, π‘Ÿ) offer the factorization of 𝑂. Polynomials

𝑧2

𝑏, 𝑧1𝑧2 𝑏, … , 𝑧1 π‘ βˆ’1𝑧2 𝑏, 𝑧1 π‘ βˆ’1𝑧2 𝑏+1

β‹… 𝑦𝑗𝑧

1 π‘˜π‘”π‘£ 𝑦, 𝑧1, 𝑧2 π‘“π‘›βˆ’π‘£

generate a triangular matrix with (sizes of ) diagonals 𝑍𝑏, 𝑍𝑏+1, … , 𝑍𝑏+𝑠 β‹… π‘Œπ‘—+π‘£π‘π‘˜+π‘£π‘“π‘›βˆ’π‘£.

16 /19

slide-29
SLIDE 29

Our Transformations

SSE on RSA PKE on RSA

1, 𝑧2, 𝑧1𝑧2, … , 𝑧1

π‘ βˆ’1𝑧2

SSE on Takagi RSA PKE on Takagi RSA

17 /19

slide-30
SLIDE 30

Our Transformations

SSE on RSA PKE on RSA

𝑧2

𝑏, 𝑧1𝑧2 𝑏, … , 𝑧1 π‘ βˆ’1𝑧2 𝑏, 𝑧1 π‘ βˆ’1𝑧2 𝑏+1

SSE on prime power RSA PKE on prime power RSA

18 /19

slide-31
SLIDE 31

Conclusion

  • We propose generic transformations that convert lattices
  • n RSA to those on the Takagi RSA and the prime power

RSA. As applications, we propose small secret exponent attacks and partial key exposure attacks on the variants. οƒΌ Further applications of our transformations? οƒΌ Better attacks can be obtained from other frameworks?

19 /19