A Timing-Resistant Elliptic Curve Backdoor in RSA

  • Authors:
  • Adam L. Young;Moti Yung

  • Affiliations:
  • Cryptovirology Labs,;Columbia University,

  • Venue:
  • Information Security and Cryptology
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a fast algorithm for finding pairs of backdoor RSA primes (p,q) given a security parameter. Such pairs posses an asymmetric backdoorthat gives the designer the exclusive ability to factor n= pq, even when the key generation algorithm is public. Our algorithm uses a pair of twisted curves over GF(2257) and we present the first incremental search method to generate such primes. The search causes the $\frac{1}{2}$log(n)+O(log(log(n))) least significant bits of nto be modified during key generation after pis selected and before qis determined. However, we show that this is tolerable by using point compression and ECDH. We also present the first rigorous experimental benchmarks of an RSA asymmetric backdoor and show that our OpenSSL-based implementation outperforms OpenSSL RSA key generation. Our application is highly efficient key recovery. Of independent interest, we motivate the need to find large binary twists. We present the twist we generated and how we found it.