Javascript must be enabled to continue!
An Improved Attack on the RSA Variant Based on Cubic Pell Equation
View through CrossRef
In this paper, we present a novel method to solve trivariate polynomial modular equations of the form x(y2+Ay+B)+z≡0 (mod e). Our approach integrates Coppersmith’s method with lattice basis reduction to efficiently solve the former equation. Several variants of RSA are based on the cubic Pell equation x3+fy3+f2z3−3fxyz≡1 (mod N), where f is a cubic nonresidue modulus N=pq. In these variants, the public exponent e and the private exponent d satisfy ed≡1 (mod ψ(N)) with ψ(N)=p2+p+1q2+q+1. Moreover, d can be written in the form d≡v0z0 (mod ψ(N)) with any z0 satisfying gcd(z0,ψ(N))=1. In this paper, we apply our method to attack the variants when d≡v0z0 (mod ψ(N)) and when |z0| and |v0| are suitably small. We also show that our method significantly improves the bounds of the private exponents d of the previous attacks on the variants, particularly in the scenario of small private exponents and in the scenarios where partial information about the primes is available.
Title: An Improved Attack on the RSA Variant Based on Cubic Pell Equation
Description:
In this paper, we present a novel method to solve trivariate polynomial modular equations of the form x(y2+Ay+B)+z≡0 (mod e).
Our approach integrates Coppersmith’s method with lattice basis reduction to efficiently solve the former equation.
Several variants of RSA are based on the cubic Pell equation x3+fy3+f2z3−3fxyz≡1 (mod N), where f is a cubic nonresidue modulus N=pq.
In these variants, the public exponent e and the private exponent d satisfy ed≡1 (mod ψ(N)) with ψ(N)=p2+p+1q2+q+1.
Moreover, d can be written in the form d≡v0z0 (mod ψ(N)) with any z0 satisfying gcd(z0,ψ(N))=1.
In this paper, we apply our method to attack the variants when d≡v0z0 (mod ψ(N)) and when |z0| and |v0| are suitably small.
We also show that our method significantly improves the bounds of the private exponents d of the previous attacks on the variants, particularly in the scenario of small private exponents and in the scenarios where partial information about the primes is available.
Related Results
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Rhizome-rooted alfalfa (Medicago sativa L.) is an excellent forage for establishing grazing and ecological grasslands, requiring a high and stable yield. Studying the genetic and p...
On Hybrid Hyper k-Pell, k-Pell–Lucas, and Modified k-Pell Numbers
On Hybrid Hyper k-Pell, k-Pell–Lucas, and Modified k-Pell Numbers
Many different number systems have been the topic of research. One of the recently studied number systems is that of hybrid numbers, which are generalizations of other number syste...
Some Binomial Sums of k-Pell, k-Pell-Lucas and Modified k-Pell Numbers
Some Binomial Sums of k-Pell, k-Pell-Lucas and Modified k-Pell Numbers
The main goal of this paper is to find some new identities containing k-Pell and k-Pell-Lucas numbers. In addition, we use these identities to prove binomial properties of k-Pell, ...
Diophantine equations for additive Pell numbers in Pell, Pell–Lucas, and Modified Pell numbers
Diophantine equations for additive Pell numbers in Pell, Pell–Lucas, and Modified Pell numbers
This paper investigates the Diophantine equations arising from ternary additive problems of Pell, Pell–Lucas, and Modified Pell numbers. Specifically, we characterize all integer s...
Repeated sprint ability (RSA) performance is not related to body height and body weight measurements among perak sukma 2018 male rugby players
Repeated sprint ability (RSA) performance is not related to body height and body weight measurements among perak sukma 2018 male rugby players
Repeated sprint ability (RSA) is typically used for speed-endurance and agility-endurance training and assessment. RSA is preferred as it mimics actual performance during competiti...
The Properties of the Altered Pell and Pell Lucas Sequences
The Properties of the Altered Pell and Pell Lucas Sequences
The altered Pell and Pell Lucas sequences are defined by altering the Pell and Pell Lucas numbers, it is seen that they have similar properties to usual the Pell and Pell Lucas seq...
On generalized (k, r)-Pell and (k, r)-Pell–Lucas numbers
On generalized (k, r)-Pell and (k, r)-Pell–Lucas numbers
We introduce new kinds of k-Pell and k-Pell–Lucas numbers related to the distance between numbers by a recurrence relation and show their relation to the (k,r)-Pell and (k,r)-Pell–...
Hidden Real Modulus RSA Cryptosystem
Hidden Real Modulus RSA Cryptosystem
Cryptographic techniques in cyber security can be categorized into symmetric and asymmetric. Among asymmetric cryptographic techniques, the RSA algorithm is more popular and consid...

