Skip to main content

On weak RSA-keys produced from pretty good privacy

  • Session 10: Cryptanalysis of Public Key Systems
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

  • 241 Accesses

Abstract

We report that Pretty Good Privacy (PGP) generates weak RSA-moduli which is vulnerable against P + l-factoring attack, because PGP's algorithm for generating prime numbers is designed only to produce a large prime number P so that P - 1 has a large prime factor. We count the number of weak keys in PGP via experimental computation with theoretical consideration. Our obtained results show that bad primes are generated in PGP and induced weak keys can be easily breakable via P + 1-factoring method. For example, in the case of RSA-key with 512-bit, we could attack

  1. 1.

    0.3% users' systems with only 15 hours single PC-computation (very weak keys!!),

  2. 2.

    2% users' systems with 50 days single PC-computation (weak keys!).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D.Akins, M.Graff, A.K.Lenstra, and P.C.Leyland, “The magic words are squeamish ossifrage,” Lecture Notes in Computer Science 917, pp.263–277, 1995. (Advances in Cryptology — ASIACRYPT'94)

    Google Scholar 

  2. B.Dixon, A.K.Lenstra, “Massively parallel elliptic curve factoring” Lecture Notes in Computer Science 658, pp.183–193, 1993. (Advances in Cryptology — EUROCRYPT'92)

    Google Scholar 

  3. S.Garfinkel, “PGP:Pretty Good Privacy” O'Reilly & Associates, Inc., 1995.

    Google Scholar 

  4. J.Gordon, “Strong Primes are Easy to Find” Lecture Notes in Computer Science 208, pp.216–223, 1985. (Advances in Cryptology — EUROCRYPT'84)

    Google Scholar 

  5. J.Gordon, “Strong RSA keys” Electronics Letters, vol.20, No.12, pp.514–516, 1984.

    Google Scholar 

  6. “Intel Microprocessor Quick Reference Guide”, http://www.intel.com/pressroom/

    Google Scholar 

  7. D.E.Knuth and L.Trabb-Pardo, “Analysis of simple factorization algorithm,” TCS, Vol.3 (1976), pp.321–348

    Article  Google Scholar 

  8. U.M.Maurer, “Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Prameters” J.Cryptology, vol.8, pp.123–155, 1995.

    Article  Google Scholar 

  9. “Downloading PGP”, http://www.ifi.uio.no/pgp/

    Google Scholar 

  10. “PGP ATTACKS”, http://axion.physics.ubc.ca/pgp-attack.html

    Google Scholar 

  11. J.M.Pollard, “Theorems on Factorization and Primality Testing” Proc. Cambr. Philos. Soc, vol.76, pp.521–528, 1974.

    Google Scholar 

  12. J.M.Pollard, “Monte Carlo Methods for Factorization” BIT, vol.15, pp.331–334, 1975.

    Article  Google Scholar 

  13. H.Riesel, “Prime Numbers and Computer Methods for Factorization” Birkhauser, 1994.

    Google Scholar 

  14. R.L.Rivest, A.Shamir, L.Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem” Comm. ACM, vol.21, pp.120–126, 1978.

    Article  Google Scholar 

  15. G.J.Simmons and M.J.Norris, “Preliminary comments on the M.I.T. public-key cryptosystem,” Cryptologia, 1 (1997), 406–414

    Google Scholar 

  16. J.S.Taylor, “Generating strong primes” Electronics Letters, vol.22, No.16, pp.875–877, 1986.

    Google Scholar 

  17. H.C.Williams, “A p+1 Method of Factoring” Mathematics of Computation, vol.39, No.159, pp.225–234, Jul. 1982.

    Google Scholar 

  18. A.Young,M.Yung, “The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?” Lecture Notes in Computer Science 1109, pp.91–103,1996. (Advances in Cryptology — CRYPTO'96)

    Google Scholar 

  19. P.R.Zimmermann, “PGP Source Code and Internals” MIT Press, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Sakai, Y., Sakurai, K., Ishizukal, H. (1997). On weak RSA-keys produced from pretty good privacy. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028487

Download citation

  • DOI: https://doi.org/10.1007/BFb0028487

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics