The better bound of private key in RSA with unbalanced primes

  • Authors:
  • Hyun-Soo Hong;Ho-Kyu Lee;Hyang-Sook Lee;Hee-Jung Lee

  • Affiliations:
  • Department of Mathematics, Ewha Womans University, Seoul, 120-750, South Korea;Department of Mathematics, Ewha Womans University, Seoul, 120-750, South Korea;Department of Mathematics, Ewha Womans University, Seoul, 120-750, South Korea;Department of Mathematics, Kangnam University, 449-702, Kyung-Gi Do, South Korea

  • Venue:
  • Applied Mathematics and Computation
  • Year:
  • 2003

Quantified Score

Hi-index 0.48

Visualization

Abstract

At Asiacrypt '99, Sun, Yang and Laih proposed three different schemes of RSA cryptosystem to avoid all known attacks including Boneh-Durfee attack. One year after, Durfee and Nguyen attacked two out of these three schemes based on Coppersmith's lattice technique for finding small roots to trivariate modular polynomial equations. The bounds of private key for the first and third schemes were much improved, but the bound of the second scheme was not good enough. Our result improves Durfee and Nguyen's bound of the private exponent d from N0.483 to N0.486 for the second scheme. This implies the system is insecure if the private exponent d 0.486.