Abstract
RSA cryptosystem is based on the difficulty of factoring large integers. It is used in encryption as well as in digital signature for providing security and authenticity of information. RSA is employed in various security applications. RSA has been extensively analyzed for flaws and cryptanalytic attacks but it is still considered secure due to adequate countermeasures and improvements reported. In this paper, we present a brief overview on RSA, discuss various flaws and cryptanalytic attacks including applicability of genetic algorithm and some countermeasures to overcome from certain flaws and cryptanalytic attacks. The review study shows that RSA is a most popular secure asymmetric cryptosystem and its strength would remain intact until availability of quantum computers.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3/4), 379–423/623–656 (1948)
Mollin, R.A.: An Introduction to Cryptography. Chapman & Hall, CRC Press (2010)
Diffe, W., Hellman, M.: New directions in cryptography. Trans. Inf. Theory 22(6), 644–654 (1976)
Merkle, R.C., Hellman, M.E.: Hiding information and receipts in trapdoor Knapsacks. In: International Symposium on Information Theory, Cornell University, Ithaca, New York (1977)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Ellis, J.H.: The History of Non-secret Encryption. GCHQ-CESG Publication, London (1987)
Lenstra, A.K., James, P.H., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Ron was wrong, Whit is right. http://eprint.iacr.org/2012/064 (2012)
Ali, H., Al-Salami, M.: Timing attack prospect for RSA cryptanalysis using genetic algorithm technique. Int. Arab J. Inf. Tech. 1(1), 80–84 (2004)
Qiao, G., Lam, K.-Y.: RSA signature algorithm for microcontroller implementation. In: Proceedings of CARDIS’98, LNCS, vol. 1820, pp. 353–356 (1998)
Jochemsz, E., May, A.: A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. In: Proceedings of ASIACRYPT’06, LNCS, vol. 4284, pp. 267–282 (2006)
Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices Amer. Math. Soc. 46(2), 203–213 (1999)
Jevons, W.S.: The Principles of Science: A Treatise on Logic and Scientific Method. Macmillan & Co., London (1874)
Crandall, R., Pomerance, C.: Prime Numbers: A Computational Perspective. 2nd edn. Springer-Verlag, New York (2005)
Aoki, K., Franke, J., Kleinjung, T., Lenstra, A.K., Osvik, D.A.: A kilobit special number field sieve factorization. In: Proceedings of ASIACRYPT’07, LNCS, vol. 4833, pp. 1–12 (2007)
Kleinjung, T., Aoki, K., Franke, J., Lenstra, A.K., Thome, E., Bos, J.W., Gaudry, P., Kruppa, A., Montgomery, P.L., Osvik, D.A.,te Riele, H., Timofeev, A., Zimmermann, P.: Factorization of a 768-bit RSA modulus. Advances in Cryptology, LNCS, vol. 6223, pp. 333–350 (2010)
Bai, S., Thome, E. Zimmermann, P.: Factorisation of RSA-704 with CADO-NFS. crypto-eprint archive, 369 (2012)
Shamir, A. : Factoring large numbers with the TWINKLE device. CHES’99, LNCS, vol. 1717, pp. 2–12 (1999)
Shamir, A., Tromer, E.: Factoring large numbers with the TWIRL device. CRYPTO’03, LNCS, vol. 2729, pp. 1–26 (2003)
Bellare, M., Rogaway, P.: Optimal asymmetric encryption. EUROCRYPT’94, LNCS, vol. 950, pp. 92–111 (1995)
Wiener, H.: Cryptanalysis of short RSA secret exponents. Trans. Inf. Theory 36(3), 553–558 (1990)
Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N 0.292. Trans. Inf. Theory 46(4), 1339–1349 (2000)
Steinfeld, R., Contini, S.,Wang, H., Pieprzyk, J.: Converse results to the Wiener attack on RSA. PKC’05, LNCS, vol. 3386, pp. 184–198 (2005)
Jochemsz, E., May, A.: A polynomial time attack on RSA with private CRT-exponents smaller than N 0.73. Advances in Cryptology, LNCS, vol. 4622, pp. 395–411 (2007)
Bleichenbacher, D., May, A.: New attacks on RSA with small secret CRT-exponents. PKC’06, LNCS, vol. 3958, pp. 1–13 (2006)
Nitaj, A.: A new attack on RSA and CRT-RSA. AFRICACRYPT’12, LNCS, vol. 7374, pp. 221–233 (2012)
Boneh, D., Durfee, G., Frankel, Y.: An attack on RSA given a small fraction of the private key bits. ASIACRYPT’98, LNCS, vol. 1514, pp. 25–34 (1998)
Blomer, J., May, A.: New partial key exposure attacks on RSA. CRYPTO’03, LNCS, vol. 2729, pp. 27–43 (2003)
Ernst, M., Jochemsz, E., May, A., de Weger, B.: Partial key exposure attacks on RSA up to full size exponents. EUROCRYPT’05, LNCS, vol. 3494, pp. 371–386 (2005)
Coron, J.-S.: Finding small roots of bivariate integer equations revisited. EUROCRYPT’04, LNCS, vol. 3027, pp. 492–505 (2004)
Sarkar, S., Gupta, S., Maitra, S.:Partial key exposure attack on RSAC improvements for limited lattice dimensions. INDOCRYPT’10, LNCS, vol. 6498, pp. 2–16 (2010)
Joye, M., Lepoint, T.: Partial key exposure on RSA with private exponents larger than N. ISPEC’12, LNCS, vol. 7232, pp. 369–380 (2012)
Jochemsz, E., May, A.: A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. ASIACRYPT’06. LNCS, vol. 4284, pp. 267–282 (2006)
Howgrave, N., Graham: Finding small roots of univariate modular equations revisited. A cryptography and coding, LNCS, vol. 1355, pp. 131–142 (1997)
May, A.: New RSA vulnerabilities using lattice reduction methods. PhD thesis, University of Paderborn (2003)
Hastad, J.: Solving simultaneous modular equations of low degree. SIAM J. Comput. 17, 336–341 (1988)
Bortz, A., Boneh, D., Nangy, P.: Exposing private information by timing web applications. In: Proceedings of the 16th International World Wide Web. Conference, Banff, Alberta, pp. 8–12 (2007)
May, A., Ritzenhofen, M.: Solving systems of modular equations in one variable: how many RSA-encrypted messages does Eve need to know? PKC’08, LNCS, vol. 2146, pp. 37–46 (2008)
Franklin, M.K., Reiter, M.K.: A linear protocol failure for RSA with exponent three. Crypto’95 Rump Session (1995)
Coppersmith, D., Franklin, M., Patarin, J., Reiter, M.: Low-exponent RSA with related messages. EUROCRYPT’96, LNCS, vol. 1070, pp. 1–9 (1996)
Boneh, D., DeMillo, R.A., Lipton, R. J.: On the importance of checking cryptographic protocols for faults. EUROCRYPT’97, LNCS, vol. 1233, pp. 37–51 (1997)
Shamir, A.: Method and apparatus for protecting public key schemes from timing and fault attacks. U.S. Patent Number 5, 991,415 (1999)
Joye, M., Pailler, P., Yen, S.-M.: Secure evaluation of modular functions. In: International Workshop on Cryptology and Network Security, pp.227–229 (2001)
Biham, E., Carmeli, Y., Shamir, A.: Bug attacks. CRYPTO’08, LNCS, vol. 5157, pp. 221–240 (2008)
Pellegrini, A., Bertacco, V., Austin, T.: Fault based attack of RSA authentication. In: Proceedings of the Conference on Design, Automation and Test, pp. 855–860 (2010)
Kocher, P.:Timing attacks on implementations of Diffe-Hellman, RSA, DSS and other systems. CRYPTO’96, LNCS, vol. 1109, pp. 104–113 (1996)
Schindler, W.: A timing attack against RSA with the Chinese remainder theorem. CHES’2000, LNCS, vol. 1965, pp. 110–125 (2000)
Brumley, D., Boneh, D.: Remote timing attacks are practical. In: Proceedings of the 12th Usenix Security Symposium, pp. 1-14 (2003)
Kocher, P., Jae, J., Jun, B.: Differential power analysis. CYRPTO’99, LNCS, vol. 1666, pp. 388–397 (1999)
Finke, T., Gebhardt, M., Schindler, W.: New side-channel attack on RSA prime generation. CHES’09, LNCS, vol. 5747, pp. 141–155 (2009)
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1. CRYPTO’98, LNCS, vol. 1462, pp.1–12 (1998)
Bleichenbacher, D.: Forging some RSA signature on pencil and paper. Rump Session, CRYPTO’06 (2006)
Izu, T., Shimoyama, T., Takenaka, M.: Extending Bleichenbacher’s forgery attack. J. Inf. Process. 16, 122–129 (2008)
Jager, T., Schinzel, S., Somorovsky, J.: Bleichenbacher’s attack strikes again: breaking PKCS# 1 v1.5 in XML encryption? ESORICS’12, LNCS, vol. 7459, pp.752–769 (2012)
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. FOCS’94, pp. 124–134 (1994)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Dubey, M.K., Ratan, R., Verma, N., Saxena, P.K. (2014). Cryptanalytic Attacks and Countermeasures on RSA. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_70
Download citation
DOI: https://doi.org/10.1007/978-81-322-1771-8_70
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1770-1
Online ISBN: 978-81-322-1771-8
eBook Packages: EngineeringEngineering (R0)