A new simultaneous diophantine attack upon RSA moduli N = pq
This paper reports four new cryptanalytic attacks which show that the t instances of RSA moduli N = pq can be simultaneously factored in polynomial time using simultaneous diophantine approximations and lattice basis reduction techniques. In our technique we utilize the relation given by N−[(a j/i+b...
Main Authors: | Abubakar, Saidu Isah, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Institute for Mathematical Research, Universiti Putra Malaysia
2018
|
Online Access: | http://psasir.upm.edu.my/id/eprint/66551/1/Cryptology2018-6.pdf |
Similar Items
-
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019) -
New cryptanalytic attack on RSA modulus N = pq using small prime difference method
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2019) -
New Cryptanalytic Attack on RSA Modulus <i>N</i> = <i>pq</i> Using Small Prime Difference Method
by: Muhammad Rezal Kamel Ariffin, et al.
Published: (2018-12-01) -
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024) -
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)