File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: The Effectiveness of Lattice Attacks Against Low-Exponent RSA

TitleThe Effectiveness of Lattice Attacks Against Low-Exponent RSA
Authors
Issue Date1999
PublisherSpringer.
Citation
Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), Kamakura, Japan, 1-3 March 1999. In Public Key Cryptography, p. 204-218. Berlin: Springer, 1999 How to Cite?
AbstractAt Eurocrypt’ 96, Coppersmith presented a novel application of lattice reduction to find small roots of a univariate modular polynomial equation. This led to rigorous polynomial attacks against RSA with low public exponent, in some particular settings such as encryption of stereotyped messages, random padding, or broadcast applications à la Haståd. Theoretically, these are the most powerful known attacks against low-exponent RSA. However, the practical behavior of Coppersmith’s method was unclear. On the one hand, the method requires reductions of high-dimensional lattices with huge entries, which could be out of reach. On the other hand, it is well-known that lattice reduction algorithms output better results than theoretically expected, which might allow better bounds than those given by Coppersmith’s theorems. In this paper, we present extensive experiments with Coppersmith’s method, and discuss various trade-offs together with practical improvements. Overall, practice meets theory. The warning is clear: one should be very cautious when using the low-exponent RSA encryption scheme, or one should use larger exponents
Persistent Identifierhttp://hdl.handle.net/10722/283489
ISBN
ISSN
2023 SCImago Journal Rankings: 0.606
ISI Accession Number ID
Series/Report no.Lecture Notes in Computer Science ; 1560

 

DC FieldValueLanguage
dc.contributor.authorCoupé, C-
dc.contributor.authorNguyen, P-
dc.contributor.authorStern, J-
dc.date.accessioned2020-06-23T07:58:59Z-
dc.date.available2020-06-23T07:58:59Z-
dc.date.issued1999-
dc.identifier.citationSecond International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), Kamakura, Japan, 1-3 March 1999. In Public Key Cryptography, p. 204-218. Berlin: Springer, 1999-
dc.identifier.isbn9783540656449-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/283489-
dc.description.abstractAt Eurocrypt’ 96, Coppersmith presented a novel application of lattice reduction to find small roots of a univariate modular polynomial equation. This led to rigorous polynomial attacks against RSA with low public exponent, in some particular settings such as encryption of stereotyped messages, random padding, or broadcast applications à la Haståd. Theoretically, these are the most powerful known attacks against low-exponent RSA. However, the practical behavior of Coppersmith’s method was unclear. On the one hand, the method requires reductions of high-dimensional lattices with huge entries, which could be out of reach. On the other hand, it is well-known that lattice reduction algorithms output better results than theoretically expected, which might allow better bounds than those given by Coppersmith’s theorems. In this paper, we present extensive experiments with Coppersmith’s method, and discuss various trade-offs together with practical improvements. Overall, practice meets theory. The warning is clear: one should be very cautious when using the low-exponent RSA encryption scheme, or one should use larger exponents-
dc.languageeng-
dc.publisherSpringer.-
dc.relation.ispartofPublic Key Cryptography-
dc.relation.ispartofseriesLecture Notes in Computer Science ; 1560-
dc.titleThe Effectiveness of Lattice Attacks Against Low-Exponent RSA-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/3-540-49162-7_16-
dc.identifier.scopuseid_2-s2.0-84899108547-
dc.identifier.spage204-
dc.identifier.epage218-
dc.identifier.isiWOS:000083636200016-
dc.publisher.placeBerlin-
dc.identifier.issnl0302-9743-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats