Cryptanalysis of RSA with small prime difference (Q1598120)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Cryptanalysis of RSA with small prime difference |
scientific article; zbMATH DE number 1747256
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Cryptanalysis of RSA with small prime difference |
scientific article; zbMATH DE number 1747256 |
Statements
Cryptanalysis of RSA with small prime difference (English)
0 references
29 May 2002
0 references
The author proves that choosing an RSA modulus with a small difference between its prime factors yields improvements on the small private exponent attacks of Wiener and Boneh-Durfee. The following theorem is the main result of this paper. Theorem. Let \(p,q\) be large primes of about the same size, \(n=pq\) and \(\Delta=|p-q|\). Let \(e,d\) be integers \(>1\) and \(<\varphi (n)\), satisfying \(ed\equiv 1\pmod{\varphi (n)}\). Put \(\Delta=n^{\beta}\) and \(d=n^{\delta}\). Given only \(n\) and \(e\), the factors \(p,q\) of \(n\) and the number \(d\) can be recovered efficiently whenever \(2-4\beta<\delta<1-\sqrt{2\beta -\frac 12}\) or \(\delta<\frac 16(4\beta +5)-\frac 13\sqrt{(4\beta +5)(4\beta -1)}\).
0 references
cryptanalysis
0 references
RSA
0 references
factoring large integers
0 references