Javascript must be enabled to continue!
Vulnerabilities of \(ex^2\) - \(y^2\)\(\phi\) (N)= z Using Modulus of the Form N= \(p^r\)\(q^s\)
View through CrossRef
The technical details of RSA works on the idea that it is easy to generate the modulus by multiplying two sufficiently large prime numbers together, but factorizing that number back into the original prime numbers is extremely difficult. Suppose that \(N=p^r q^s\) are RSA modulus, where \(p\) and \(q\) are product of two large unknown of unbalance primes for \(2 \leq s<r\). The paper proves that using an approximation of \(\phi(N) \approx\) \(N-N^{\frac{r+8-1}{2 r}}\left(\lambda^{\frac{1-8}{2 r}}+\lambda^{\frac{-8}{2 r}}\right)+N^{\frac{r+8-2}{2 T}} \lambda^{\frac{1-8}{2 r}}\), private keys \(\frac{x^2}{y^2}\) can be found from the convergents of the continued fractions expansion of\[\left|\frac{e}{N-N^{\frac{r+8-1}{2 r}}\left(\lambda^{\frac{1-8}{2 r}}+\lambda^{\frac{-8}{2 r}}\right)+N^{\frac{r+8-2}{2 r}} \lambda^{\frac{1-8}{2 r}}}-\frac{y^2}{x^2}\right|<\frac{1}{2 x^4}\]
which leads to the factorization of the moduli \(N=p^r q^s\) into unbalance prime factors p and q in polynomial time. The second part of this reseach report further, how to generalized two system of equations of the form \(e_ux^2\) - \(y^2_u\phi(N_u)\) = \(z_u\) and \(e_ux^2_u\) - \(y^2\phi(N_u)\) = \(z_u\) using simultaneous Diophantine approximation method and LLL algorithm to and the values of the unknown integers \(x,y_u\),\(\phi(N_u)\) and \(x_u\),y,\(\phi(N_u)\) respectively, which yeild to successful factorization of k moduli \(N_u=p^r_uq^s_u\) for u = 1,2, ... k in polynomial time.
Sciencedomain International
Title: Vulnerabilities of \(ex^2\) - \(y^2\)\(\phi\) (N)= z Using Modulus of the Form N= \(p^r\)\(q^s\)
Description:
The technical details of RSA works on the idea that it is easy to generate the modulus by multiplying two sufficiently large prime numbers together, but factorizing that number back into the original prime numbers is extremely difficult.
Suppose that \(N=p^r q^s\) are RSA modulus, where \(p\) and \(q\) are product of two large unknown of unbalance primes for \(2 \leq s<r\).
The paper proves that using an approximation of \(\phi(N) \approx\) \(N-N^{\frac{r+8-1}{2 r}}\left(\lambda^{\frac{1-8}{2 r}}+\lambda^{\frac{-8}{2 r}}\right)+N^{\frac{r+8-2}{2 T}} \lambda^{\frac{1-8}{2 r}}\), private keys \(\frac{x^2}{y^2}\) can be found from the convergents of the continued fractions expansion of\[\left|\frac{e}{N-N^{\frac{r+8-1}{2 r}}\left(\lambda^{\frac{1-8}{2 r}}+\lambda^{\frac{-8}{2 r}}\right)+N^{\frac{r+8-2}{2 r}} \lambda^{\frac{1-8}{2 r}}}-\frac{y^2}{x^2}\right|<\frac{1}{2 x^4}\]
which leads to the factorization of the moduli \(N=p^r q^s\) into unbalance prime factors p and q in polynomial time.
The second part of this reseach report further, how to generalized two system of equations of the form \(e_ux^2\) - \(y^2_u\phi(N_u)\) = \(z_u\) and \(e_ux^2_u\) - \(y^2\phi(N_u)\) = \(z_u\) using simultaneous Diophantine approximation method and LLL algorithm to and the values of the unknown integers \(x,y_u\),\(\phi(N_u)\) and \(x_u\),y,\(\phi(N_u)\) respectively, which yeild to successful factorization of k moduli \(N_u=p^r_uq^s_u\) for u = 1,2, .
k in polynomial time.
Related Results
Un manoscritto equivocato del copista santo Theophilos († 1548)
Un manoscritto equivocato del copista santo Theophilos († 1548)
<p><font size="3"><span class="A1"><span style="font-family: 'Times New Roman','serif'">ΕΝΑ ΛΑΝ&...
Abstract 1627: PHI-501, a novel and potent pan-RAF inhibitor in metastatic melanoma
Abstract 1627: PHI-501, a novel and potent pan-RAF inhibitor in metastatic melanoma
Abstract
Background: PHI-501 has been developed as a novel inhibitor of NRAS mutated acute myeloid leukemia. Big data and artificial intelligence (AI)-based drug dis...
North Syrian Mortaria and Other Late Roman Personal and Utility Objects Bearing Inscriptions of Good Luck
North Syrian Mortaria and Other Late Roman Personal and Utility Objects Bearing Inscriptions of Good Luck
<span style="font-size: 11pt; color: black; font-family: 'Times New Roman','serif'">ΠΗΛΙΝΑ ΙΓ&Delta...
A 2‐year prospective evaluation of the Prostate Health Index in guiding biopsy decisions in a large cohort
A 2‐year prospective evaluation of the Prostate Health Index in guiding biopsy decisions in a large cohort
Objectives
To prospectively evaluate how the Prostate Health Index (PHI) impacts on clinical decision in a real‐life setting for men with a prostate‐specific an...
Intracellular pH regulation in rat Schwann cells
Intracellular pH regulation in rat Schwann cells
AbstractWe examined H+ and HCO3− transport mechanisms that are involved in the regulation of intracellular pH of Schwann cells. Primary cultures of Schwann cells were prepared from...
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
AbstractBlockchain technology has gained significant attention and adoption due to its decentralized nature, and promising secure and immutable transactions. The interpretation of ...
The regulation of cytosolic pH in isolated presynaptic nerve terminals from rat brain.
The regulation of cytosolic pH in isolated presynaptic nerve terminals from rat brain.
Cytosolic pH (pHi) was measured in presynaptic nerve terminals isolated from rat brain (synaptosomes) using a fluorescent pH indicator, 2',7'-bis(carboxyethyl)-5,6-carboxyfluoresce...
General Sinus Principles: Extension of Trigonometric Functions
General Sinus Principles: Extension of Trigonometric Functions
Abstract
Classical trigonometric functions $\sin(\alpha)$, $\cos(\alpha)$, and $\tan(\alpha)$ are implicitly defined under an existential condition: the right-angle...

