Skip to main content

The multi-variable modular polynomial and its applications to cryptography

  • Session 9b: Invited Presentation
  • Conference paper
  • First Online:
Book cover Algorithms and Computation (ISAAC 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1178))

Included in the following conference series:

Abstract

We prove the extension of the Håstad algorithm to the multi-variable modular polynomial. Although the Håstad attack is one of the strongest known attacks on RSA-type cryptosystems, the original Håstad attack is generally not applicable to multi-variable cryptosystems, where the plain text space (the encryption domain) is multi-variable. As an application of our extension, we attack RSA-type cryptosystems over elliptic curves and show the critical number of encrypted texts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Buchberger, “Application of gröbner bases in non-linear computer science”, Lecture Notes in Computer Science, Vol.296, (1987), pp.52–80.

    Google Scholar 

  2. D. Coppersmith, M. Franklin, J. Patarin, M. Reiter, “Low-exponet RSA with related messages”, Advances in Cryptology — EURO-CRYPT '96, LNCS 1070, (1996), pp.1–9.

    Google Scholar 

  3. D. Coppersmith, “Finding a small root of a univariate modular equation”, Advances in Cryptology — EUROCRYPT '96, LNCS 1070, (1996), pp.155–165.

    Google Scholar 

  4. J. Håstad, “Solving simultaneous modular equations of low degree”, SIAM J. Computing, Vol.17, No.2, (1988), pp.336–341.

    Article  Google Scholar 

  5. K. Koyama, U. M. Maurer, T. Okamoto and S. A. Vanstone, “New public-key schemes based on elliptic curves over the ring Zn”, Advances in Cryptology — CRYPTO '91, LNCS 576, (1992), pp.252–266.

    Google Scholar 

  6. K. Kurosawa, K. Okada, S. Tsujii, “Low exponent attack against elliptic curve RSA”, Information Processing Letters, 53, (1995), pp.77–83.

    Article  Google Scholar 

  7. H. Kuwakado, K. Koyama; “Security of RSA-type cryptosystems over elliptic curves against the Håstad attack”, Electronics Letters, 30, No.22, (1994), pp.1843–1844.

    Article  Google Scholar 

  8. J. H. Silverman, “The arithmetic of elliptic curves”, GTM106, Springer-Verlag, Berlin, 1986.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tetsuo Asano Yoshihide Igarashi Hiroshi Nagamochi Satoru Miyano Subhash Suri

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Takagi, T., Naito, S. (1996). The multi-variable modular polynomial and its applications to cryptography. In: Asano, T., Igarashi, Y., Nagamochi, H., Miyano, S., Suri, S. (eds) Algorithms and Computation. ISAAC 1996. Lecture Notes in Computer Science, vol 1178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0009515

Download citation

  • DOI: https://doi.org/10.1007/BFb0009515

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-62048-8

  • Online ISBN: 978-3-540-49633-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics