Attacking RSA moduli with SAT solvers

This thesis aimed to explore how sequential boolean satisability solvers can be used on the integer factorisation problem. The integer factorisation problem is believed to be hard and modern public key cryptography relies on that,note worthily SSL/TSL and SSH support the use of RSA. However, it is n...

Full description

Bibliographic Details
Main Author: Asketorp, Jonatan
Format: Others
Language:English
Published: KTH, Skolan för datavetenskap och kommunikation (CSC) 2014
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-157352
id ndltd-UPSALLA1-oai-DiVA.org-kth-157352
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-kth-1573522018-01-12T05:09:46ZAttacking RSA moduli with SAT solversengAsketorp, JonatanKTH, Skolan för datavetenskap och kommunikation (CSC)2014Computer SciencesDatavetenskap (datalogi)This thesis aimed to explore how sequential boolean satisability solvers can be used on the integer factorisation problem. The integer factorisation problem is believed to be hard and modern public key cryptography relies on that,note worthily SSL/TSL and SSH support the use of RSA. However, it is not proven that integer factorisation is hard and therefore it is of great importanceto explore dierent attack avenues. The modulus in RSA is a semiprime, e.g.an integer that is the product of two primes. Hence, in this thesis an empiricalstudy of the factorisation of semiprimes with a bit-length of up to 32 bits iscarried out. Randomly selected semiprimes are factorized through six dierent reductions using three dierent solvers (Glucose, Lingeling and PicoSAT) and the result are compared to that of MSieve, an open-source integer factorisationprogram. As seen in the comparison boolean satisability solvers cannot be used as a replacement of an integer factorisation solver. Additionally comparisons between the dierent reductions and boolean satisability solvers show that the combination of solver and reduction greatly aects performance. The implication is that further explorations of the integer factorisation problem with boolean satisability solvers can greatly benet from either avoiding a inadequate solver and reduction pair or from attempting to identify the outliers that signify a inadequate coupling. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-157352application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic Computer Sciences
Datavetenskap (datalogi)
spellingShingle Computer Sciences
Datavetenskap (datalogi)
Asketorp, Jonatan
Attacking RSA moduli with SAT solvers
description This thesis aimed to explore how sequential boolean satisability solvers can be used on the integer factorisation problem. The integer factorisation problem is believed to be hard and modern public key cryptography relies on that,note worthily SSL/TSL and SSH support the use of RSA. However, it is not proven that integer factorisation is hard and therefore it is of great importanceto explore dierent attack avenues. The modulus in RSA is a semiprime, e.g.an integer that is the product of two primes. Hence, in this thesis an empiricalstudy of the factorisation of semiprimes with a bit-length of up to 32 bits iscarried out. Randomly selected semiprimes are factorized through six dierent reductions using three dierent solvers (Glucose, Lingeling and PicoSAT) and the result are compared to that of MSieve, an open-source integer factorisationprogram. As seen in the comparison boolean satisability solvers cannot be used as a replacement of an integer factorisation solver. Additionally comparisons between the dierent reductions and boolean satisability solvers show that the combination of solver and reduction greatly aects performance. The implication is that further explorations of the integer factorisation problem with boolean satisability solvers can greatly benet from either avoiding a inadequate solver and reduction pair or from attempting to identify the outliers that signify a inadequate coupling.
author Asketorp, Jonatan
author_facet Asketorp, Jonatan
author_sort Asketorp, Jonatan
title Attacking RSA moduli with SAT solvers
title_short Attacking RSA moduli with SAT solvers
title_full Attacking RSA moduli with SAT solvers
title_fullStr Attacking RSA moduli with SAT solvers
title_full_unstemmed Attacking RSA moduli with SAT solvers
title_sort attacking rsa moduli with sat solvers
publisher KTH, Skolan för datavetenskap och kommunikation (CSC)
publishDate 2014
url http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-157352
work_keys_str_mv AT asketorpjonatan attackingrsamoduliwithsatsolvers
_version_ 1718605255280689152