Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Vulnerabilities of \(ex^2\) - \(y^2\)\(\phi\) (N)= z Using Modulus of the Form N= \(p^r\)\(q^s\)

View through CrossRef
The technical details of RSA works on the idea that it is easy to generate the modulus by multiplying two sufficiently large prime numbers together, but factorizing that number back into the original prime numbers is extremely difficult. Suppose that \(N=p^r q^s\) are RSA modulus, where \(p\) and \(q\) are product of two large unknown of unbalance primes for \(2 \leq s<r\). The paper proves that using an approximation of \(\phi(N) \approx\) \(N-N^{\frac{r+8-1}{2 r}}\left(\lambda^{\frac{1-8}{2 r}}+\lambda^{\frac{-8}{2 r}}\right)+N^{\frac{r+8-2}{2 T}} \lambda^{\frac{1-8}{2 r}}\), private keys \(\frac{x^2}{y^2}\) can be found from the convergents of the continued fractions expansion of\[\left|\frac{e}{N-N^{\frac{r+8-1}{2 r}}\left(\lambda^{\frac{1-8}{2 r}}+\lambda^{\frac{-8}{2 r}}\right)+N^{\frac{r+8-2}{2 r}} \lambda^{\frac{1-8}{2 r}}}-\frac{y^2}{x^2}\right|<\frac{1}{2 x^4}\] which leads to the factorization of the moduli \(N=p^r q^s\) into unbalance prime factors p and q in polynomial time. The second part of this reseach report further, how to generalized two system of equations of the form \(e_ux^2\) - \(y^2_u\phi(N_u)\) = \(z_u\) and \(e_ux^2_u\) - \(y^2\phi(N_u)\) = \(z_u\) using simultaneous Diophantine approximation method and LLL algorithm to and the values of the unknown integers \(x,y_u\),\(\phi(N_u)\) and \(x_u\),y,\(\phi(N_u)\) respectively, which yeild to successful factorization of k moduli \(N_u=p^r_uq^s_u\) for u = 1,2, ... k in polynomial time.
Title: Vulnerabilities of \(ex^2\) - \(y^2\)\(\phi\) (N)= z Using Modulus of the Form N= \(p^r\)\(q^s\)
Description:
The technical details of RSA works on the idea that it is easy to generate the modulus by multiplying two sufficiently large prime numbers together, but factorizing that number back into the original prime numbers is extremely difficult.
Suppose that \(N=p^r q^s\) are RSA modulus, where \(p\) and \(q\) are product of two large unknown of unbalance primes for \(2 \leq s<r\).
The paper proves that using an approximation of \(\phi(N) \approx\) \(N-N^{\frac{r+8-1}{2 r}}\left(\lambda^{\frac{1-8}{2 r}}+\lambda^{\frac{-8}{2 r}}\right)+N^{\frac{r+8-2}{2 T}} \lambda^{\frac{1-8}{2 r}}\), private keys \(\frac{x^2}{y^2}\) can be found from the convergents of the continued fractions expansion of\[\left|\frac{e}{N-N^{\frac{r+8-1}{2 r}}\left(\lambda^{\frac{1-8}{2 r}}+\lambda^{\frac{-8}{2 r}}\right)+N^{\frac{r+8-2}{2 r}} \lambda^{\frac{1-8}{2 r}}}-\frac{y^2}{x^2}\right|<\frac{1}{2 x^4}\] which leads to the factorization of the moduli \(N=p^r q^s\) into unbalance prime factors p and q in polynomial time.
The second part of this reseach report further, how to generalized two system of equations of the form \(e_ux^2\) - \(y^2_u\phi(N_u)\) = \(z_u\) and \(e_ux^2_u\) - \(y^2\phi(N_u)\) = \(z_u\) using simultaneous Diophantine approximation method and LLL algorithm to and the values of the unknown integers \(x,y_u\),\(\phi(N_u)\) and \(x_u\),y,\(\phi(N_u)\) respectively, which yeild to successful factorization of k moduli \(N_u=p^r_uq^s_u\) for u = 1,2, .
k in polynomial time.

Related Results

Un manoscritto equivocato del copista santo Theophilos († 1548)
Un manoscritto equivocato del copista santo Theophilos († 1548)
<p><font size="3"><span class="A1"><span style="font-family: 'Times New Roman','serif'">&Epsilon;&Nu;&Alpha; &Lambda;&Alpha;&Nu;&...
Abstract 1627: PHI-501, a novel and potent pan-RAF inhibitor in metastatic melanoma
Abstract 1627: PHI-501, a novel and potent pan-RAF inhibitor in metastatic melanoma
Abstract Background: PHI-501 has been developed as a novel inhibitor of NRAS mutated acute myeloid leukemia. Big data and artificial intelligence (AI)-based drug dis...
North Syrian Mortaria and Other Late Roman Personal and Utility Objects Bearing Inscriptions of Good Luck
North Syrian Mortaria and Other Late Roman Personal and Utility Objects Bearing Inscriptions of Good Luck
<span style="font-size: 11pt; color: black; font-family: 'Times New Roman','serif'">&Pi;&Eta;&Lambda;&Iota;&Nu;&Alpha; &Iota;&Gamma;&Delta...
A 2‐year prospective evaluation of the Prostate Health Index in guiding biopsy decisions in a large cohort
A 2‐year prospective evaluation of the Prostate Health Index in guiding biopsy decisions in a large cohort
Objectives To prospectively evaluate how the Prostate Health Index (PHI) impacts on clinical decision in a real‐life setting for men with a prostate‐specific an...
Intracellular pH regulation in rat Schwann cells
Intracellular pH regulation in rat Schwann cells
AbstractWe examined H+ and HCO3− transport mechanisms that are involved in the regulation of intracellular pH of Schwann cells. Primary cultures of Schwann cells were prepared from...
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
AbstractBlockchain technology has gained significant attention and adoption due to its decentralized nature, and promising secure and immutable transactions. The interpretation of ...
The regulation of cytosolic pH in isolated presynaptic nerve terminals from rat brain.
The regulation of cytosolic pH in isolated presynaptic nerve terminals from rat brain.
Cytosolic pH (pHi) was measured in presynaptic nerve terminals isolated from rat brain (synaptosomes) using a fluorescent pH indicator, 2',7'-bis(carboxyethyl)-5,6-carboxyfluoresce...
General Sinus Principles:  Extension of Trigonometric Functions
General Sinus Principles:  Extension of Trigonometric Functions
Abstract Classical trigonometric functions $\sin(\alpha)$, $\cos(\alpha)$, and $\tan(\alpha)$ are implicitly defined under an existential condition: the right-angle...

Back to Top