Exploiting the security of N = prqs through approximation of ϕ(N)
-
Published:2021-06-21
Issue:
Volume:
Page:2150144
-
ISSN:1793-8309
-
Container-title:Discrete Mathematics, Algorithms and Applications
-
language:en
-
Short-container-title:Discrete Math. Algorithm. Appl.
Author:
Abubakar Saidu Isah1,
Shehu Sadiq1
Affiliation:
1. Department of Mathematics, Sokoto State University, Airport Road Sokoto, PMB 2134, Nigeria
Abstract
This paper reports new techniques that exploit the security of the prime power moduli [Formula: see text] using continued fraction method. Our study shows that the key equation [Formula: see text] can be exploited using [Formula: see text] as good approximation of [Formula: see text]. This enables us to get [Formula: see text] from the convergents of the continued fractions expansion of [Formula: see text] where the bound of the private exponent is [Formula: see text] which leads to the polynomial time factorization of the moduli [Formula: see text]. We further report the polynomial time attacks that can break the security of the generalized prime power moduli [Formula: see text] using generalized system of equation of the form [Formula: see text] and [Formula: see text] by applying simultaneous Diophantine approximations and LLL algorithm techniques where [Formula: see text] and [Formula: see text].
Publisher
World Scientific Pub Co Pte Lt
Subject
Discrete Mathematics and Combinatorics