On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method

Let N = pq be an RSA modulus where p and q are primes not necessarily of the same bit size. Previous cryptanalysis results on the difficulty of factoring the public modulus N = pq deployed on variants of RSA cryptosystem are revisited. Each of these variants share a common key relation utilizing the...

Full description

Bibliographic Details
Main Authors: Wan Nur Aqlili Ruzai, Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah, Zahari Mahad, Athirah Nawawi
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9079788/
Description
Summary:Let N = pq be an RSA modulus where p and q are primes not necessarily of the same bit size. Previous cryptanalysis results on the difficulty of factoring the public modulus N = pq deployed on variants of RSA cryptosystem are revisited. Each of these variants share a common key relation utilizing the modified Euler quotient (p<sup>2</sup> - 1)(q<sup>2</sup> - 1), given by the key relation ed - k(p<sup>2</sup> - 1)(q<sup>2</sup> - 1) = 1 where e and d are the public and private keys respectively. By conducting continuous midpoint subdivision analysis upon an interval containing (p<sup>2</sup> - 1)(q<sup>2</sup> - 1) together with continued fractions on the key relation, we increase the security bound for d exponentially.
ISSN:2169-3536