Notes on Small Private Key Attacks on Common Prime RSA
- URL: http://arxiv.org/abs/2310.12572v1
- Date: Thu, 19 Oct 2023 08:27:18 GMT
- Title: Notes on Small Private Key Attacks on Common Prime RSA
- Authors: Mengce Zheng,
- Abstract summary: We point out critical deficiencies in lattice-based cryptanalysis of common prime RSA presented in this paper.
We offer an illustration of small private key attacks on common prime RSA.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We point out critical deficiencies in lattice-based cryptanalysis of common prime RSA presented in ``Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices'' [Information Sciences, 538 (2020) 54--68]. To rectify these flaws, we carefully scrutinize the relevant parameters involved in the analysis during solving a specific trivariate integer polynomial equation. Additionally, we offer a synthesized attack illustration of small private key attacks on common prime RSA.
Related papers
- Quantum inspired factorization up to 100-bit RSA number in polynomial time [0.0]
We attack the RSA factorization building on Schnorr's mathematical framework.
We factorize RSA numbers up to 256 bits encoding the optimization problem in quantum systems.
Results do not currently undermine the security of the present communication infrastructure.
arXiv Detail & Related papers (2024-10-21T18:00:00Z) - Ciphertext Malleability in Lattice-Based KEMs as a Countermeasure to Side Channel Analysis [0.0]
We discuss a vulnerability due to the ciphertext malleability of some Post-Quantum Cryptography primitives exposed by Ravi et al.
We propose a novel countermeasure exploiting the same ciphertext malleability and discuss its practical application to several PQC primitives.
arXiv Detail & Related papers (2024-09-24T14:07:48Z) - PRSA: PRompt Stealing Attacks against Large Language Models [42.07328505384544]
"prompt as a service" has greatly enhanced the utility of large language models (LLMs)
We introduce a novel attack framework, PRSA, designed for prompt stealing attacks against LLMs.
PRSA mainly consists of two key phases: prompt mutation and prompt pruning.
arXiv Detail & Related papers (2024-02-29T14:30:28Z) - Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature [0.7864304771129751]
In their 2022 study, Kuang et al. introduced Multivariable Polynomial Public Key (MPPK) cryptography.
They extended MPPK into Homomorphic Polynomial Public Key (HPPK), employing homomorphic encryption for large hidden ring operations.
arXiv Detail & Related papers (2023-11-15T13:54:23Z) - Demystifying the RSA Algorithm: An Intuitive Introduction for Novices in Cybersecurity [0.0]
The RSA algorithm is a crucial component in public-key cryptosystems.
understanding the RSA algorithm typically entails familiarity with number theory, modular arithmetic, and related concepts.
We present an intuitively crafted, student-oriented introduction to the RSA algorithm.
arXiv Detail & Related papers (2023-08-05T04:20:18Z) - Encryption with Quantum Public Keys [1.7725414095035827]
We study the question of building quantum public-key encryption schemes from one-way functions and even weaker assumptions.
We propose three schemes for quantum public-key encryption from one-way functions, pseudorandom function-like states with proof of deletion and pseudorandom function-like states, respectively.
arXiv Detail & Related papers (2023-03-09T16:17:19Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - First demonstration of a post-quantum key-exchange with a nanosatellite [58.579141089302816]
We demonstrate a post-quantum key-exchange with the nanosatellite SpooQy-1 in low Earth orbit using Kyber-512.
This implementation demonstrates the feasibility of a quantum-safe authenticated key-exchange and encryption system on SWaP constrained nanosatellites.
arXiv Detail & Related papers (2022-06-02T10:45:27Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Differentially-Private Clustering of Easy Instances [67.04951703461657]
In differentially private clustering, the goal is to identify $k$ cluster centers without disclosing information on individual data points.
We provide implementable differentially private clustering algorithms that provide utility when the data is "easy"
We propose a framework that allows us to apply non-private clustering algorithms to the easy instances and privately combine the results.
arXiv Detail & Related papers (2021-12-29T08:13:56Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.