Paper 2025/380

A New Generalized Attack on RSA-like Cryptosystems

Michel SECK, LTISI, CRISIN'2D, Ecole Polytechnique de Thies, Senegal
Oumar Niang, LTISI, CRISIN'2D, Ecole Polytechnique de Thies, Senegal
Djiby Sow, Dept. Mathematics and Computer Science, FST, UCAD, Senegal
Abstract

Rivest, Shamir, and Adleman published the RSA cryptosystem in 1978, which has been widely used over the last four decades. The security of RSA is based on the difficulty of factoring large integers $N = pq$, where $p$ and $q$ are prime numbers. The public exponent $e$ and the private exponent $d$ are related by the equation $ed - k(p-1)(q-1) = 1$. Recently, Cotan and Te{\c{s}}eleanu (NordSec 2023) introduced a variant of RSA, where the public exponent $e$ and the private exponent $d$ satisfy the equation $ed - k(p^n-1)(q^n-1) = 1$ for some positive integer $n$. In this paper, we study the general equation $eu - (p^n - 1)(q^n - 1)v = w$ with positive integers $u$ and $v$, and $w\in \mathbb{Z}$. We show that, given the public parameters $N$ and $e$, one can recover $u$ and $v$ and factor the modulus $N$ in polynomial time by combining continued fractions with Coppersmith's algorithm which relies on lattice reduction techniques, under specific conditions on $u$, $v$, and $w$. Furthermore, we show that if the private exponent $d$ in an RSA-like cryptosystem is either small or too large, then $N$ can be factored in polynomial time. This attack applies to the standard RSA cryptosystem.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
RSAContinued fractionsCrypanalysisCoppersmith's methodGeneralized Wiener attack
Contact author(s)
mseck @ ept edu sn
oniang @ ept edu sn
djiby sow @ ucad edu sn
History
2025-03-04: approved
2025-02-27: received
See all versions
Short URL
https://ia.cr/2025/380
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/380,
      author = {Michel SECK and Oumar Niang and Djiby Sow},
      title = {A New Generalized Attack on {RSA}-like Cryptosystems},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/380},
      year = {2025},
      url = {https://eprint.iacr.org/2025/380}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.