Abstract
Some algorithms to search for power residues close to a desired value are reported. They are used in the cryptanalysis of low exponent RSA with partially known clear text.
The work of the second author was partially supported by Ministerio de Ciencia y Tecnología under project TIC 2000-1044.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Batut, C., Belabas, K., Bernardi, D., Cohen, H. and Olivier, M. PARI-GP Number Theory Package. ftp://megrez.math.u-bordeaux.fr/pub/pari/ .
Brickell, E. F. and Odlyzko, M. Cryptanalysis: A survey of recent results. Proc. of the IEEE 76 (1988) 578–593
Cohen, H.: A Course in Computational Algebraic Number Theory, Springer-Verlag, Berlin (1993)
Coppersmith, D. Small solutions to polynomial equations, and low exponents RSA vulnerabilities. J. Cryptology 10 (1997) 233–260
Hastad, J. Solving simultaneous modular equations of low degree. SIAM J. Comp. 17 (1988) 336–341
Lenstra, A. K., Lenstra, H. W. and Lovász, L. Factoring polynomials with integer coefficients. Mathematische Annalen, 261 (1982) pp. 513–534
Peralta, R.: A quadratic sieve on the n-dimensional cube. In: Brickell, E. F. (ed.): Advances in Cryptology, CRYPT’92. Lecture Notes in Computer Science, Vol. 740. Springer-Verlag, Berlin Heidelberg New York (1993) 324–332.
Pomerance, C.: The quadratic sieve factoring algorithm. In: Beth, T., Cot, N., and Ingemarsson, I. (eds.): Advances in Cryptology, EUROCRYPT’84. Lecture Notes in Computer Science, Vol. 209. Springer-Verlag, Berlin Heidelberg New York (1985) 169–182.
Niven, I., Zuckerman, H.S. and Montgomery, H.L. An Introduction to the Theory of Numbers, John Wiley & Sons, Inc., New York, (1991)
Rivest, R. L., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public key cryptosystems. Comm. ACM, 21 (1978) 120–126
Silverman, R.D.: The multiple polynomial quadratic sieve. Math. Comp. 48 (1987) 329–339
Vallée B.: Generation of elements with small modular squares and provably fast integer factoring algorithms. Math. Comp. 56 (1991) 823–849
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Calvo, I.J., Moreno, G.S. (2001). Approximate Power Roots in ℤm . In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_21
Download citation
DOI: https://doi.org/10.1007/3-540-45439-X_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42662-2
Online ISBN: 978-3-540-45439-7
eBook Packages: Springer Book Archive