Skip to main content
Log in

On the optimality of lattices for the coppersmith technique

  • Original Paper
  • Published:
Applicable Algebra in Engineering, Communication and Computing Aims and scope

Abstract

We investigate a method for finding small integer solutions of a univariate modular equation, that was introduced by Coppersmith (Proceedings of Eurocrypt 1996, LNCS, vol 1070, pp 155–165, 1996) and extended by May (New RSA vulnerabilities using lattice reduction methods, Ph.D. thesis, University of Paderborn, 2003). We will refer this method as the Coppersmith technique. This paper provides a way to analyze a general limitations of the lattice construction for the Coppersmith technique. Our analysis upper bounds the possible range of U that is asymptotically equal to the bound given by the original result of Coppersmith and May. This means that they have already given the best lattice construction. In addition, we investigate the optimality for the bivariate equation to solve the small inverse problem, which was inspired by Kunihiro’s (LNCS 7483:55–69, 2012) argument. In particular, we show the optimality for the Boneh–Durfee’s equation (Proceedings of Eurocrypt 1999, LNCS, vol 1592, pp 389–401, 1999) used for RSA cryptoanalysis, To show our results, we establish framework for the technique by following the relation of Howgrave-Graham (Proceedings of cryptography and coding, LNCS, vol 1355, pp 131–142, 1997), and then concretely define the conditions in which the technique succeed and fails. We then provide a way to analyze the range of U that satisfies these conditions. Technically, we show that the original result of Coppersmith achieves the optimal bound for U when constructing a lattice in the standard way. We then provide evidence which indicates that constructing a non-standard lattice is generally difficult.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. The real root isolation can be performed in polynomial time [9]. Then, rounding the approximate solutions found by using Newton’s method can recover the integer solutions.

References

  1. Aono, Y.: A new lattice construction for partial key exposure attack for RSA. In: Proceedings of PKC 2009, LNCS, vol. 5443, pp. 34–53 (2009). http://www.is.titech.ac.jp/research/research-report/C/C-257.pdf

  2. Aono, Y.: Minkowski sum based lattice construction for multivariate simultaneous Coppersmith’s technique and applications to RSA. In: Proceedings of ACISP 2013, LNCS vol. 7959, pp. 88–103 (2013)

  3. Aono, Y., Agrawal, M., Satoh, T., Watanabe, O.: On the optimality of lattices for the Coppersmith technique. In: Proceedings of ACISP 2012, LNCS, vol. 7372, pp. 376–389 (2012)

  4. Boneh, D., Durfee, G.: Cryptanalysis of RSA with private Key \(d\) Less Than \(N^{0.292}\). In: Proceedings of Eurocrypt 1999, LNCS, vol. 1592, pp. 389–401 (1999)

  5. Blömer, J., May, A.: New partial key exposure attacks on RSA. In: Proceedings of CRTPTO 2003, LNCS, vol. 2729, pp. 27–43 (2003)

  6. Boneh, D.: Finding smooth integers in short intervals using CRT decoding. In: Proceedings of STOC 2000, pp. 265–272 (2000)

  7. Coppersmith, D.: Finding a small root of a univariate modular equation. In: Proceedings of Eurocrypt 1996, LNCS, vol. 1070, pp. 155–165 (1996)

  8. Coppersmith, D.: Finding small solutions to small degree polynomials. In: Proceedings of CaLC 2001, LNCS, vol. 2146, pp. 20–31 (2001)

  9. Collins, G.E., Akritas, A.G.: Polynomial real root isolation using Descartes’ rule of signs. In: Proceedings of the ACM Symposium on Symbolic and Algebraic Computation, pp. 272–275 (1976)

  10. Cohn, H., Heninger, N.: Ideal forms of Coppersmith’s theorem and Guruswami–Sudan list decoding. Proc. ICS 2011, 298–308 (2011)

    MATH  Google Scholar 

  11. Chinburg, T., Hemenway, B., Heninger, N., Scherr, Z.: Cryptographic applications of capacity theory: on the optimality of Coppersmith’s method for univariate polynomials. In: Proceedings of Asiacrypt 2016, Part I, LNCS, vol. 10031, pp. 759–788 (2016)

  12. Ernst, M., Jochemsz, E., May, A., Weger, B.: Partial key exposure attacks on RSA up to full size exponents. In: Proceedings of Eurocrypt 2005, LNCS, vol. 3494, pp. 371–386 (2005)

  13. Gama, N., Nguyen, P.Q.: Predicting lattice reduction. In: Proceedings of Eurocrypt 2008, Lecture Notes in Computer Science, vol. 4965, pp. 31–51 (2008)

  14. Gianni, P.: Trager, B.: Square-free algorithms in positive characteristic. In: Applicable Algebra in Engineering, Communication and Computing, vol. 7(1), pp. 1–14 (1996)

  15. Håstad, J.: Solving simultaneous modular equations of low degree. SIAM J. Comput. 17(2), 336–341 (1988)

    Article  MathSciNet  Google Scholar 

  16. Howgrave-Graham, N.: Finding small roots of univariate modular equations revisited. Proceedings of Cryptography and Coding, LNCS, vol. 1355, pp. 131–142 (1997)

  17. Howgrave-Graham, N.: Approximate integer common divisors. Proceedings of CaLC 2001, LNCS, vol. 2146, pp. 51–66 (2001)

  18. Jochemsz, E., May, A.: A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. In: Proceedings of Asiacrypt 2006, LNCS, vol. 4284, pp. 267–282 (2006)

  19. Kunihiro, N.: On optimal bounds of small inverse problems and approximate GCD problems with higher degree. LNCS 7483, 55–69 (2012)

    Google Scholar 

  20. Konyagin, S.V., Steger, T.: On polynomial congruences. Math. Notes 55(6), 596–600 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  21. Lenstra, A.K., Lenstra Jr., H.W., Lovász, L.: Factoring polynomials with rational coefficients. Math. Ann. 261, 515–534 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  22. Milne, J.S.: Étale Cohomology, Princeton Math. Series 33. Princeton University Press (1980)

  23. May, A.: New RSA Vulnerabilities Using Lattice Reduction Methods, Ph.D thesis, University of Paderborn (2003)

  24. Nguyen, P.Q., Vallée, B.: The LLL Algorithm: Survey and Applications. Springer, Berlin (2009)

    MATH  Google Scholar 

  25. Okamoto, T., Shiraishi, A.: A fast signature scheme based on quadratic inequalities. In: Proceedings of the Symposium on Security and Privacy, IEEE, pp. 123–132 (1985)

  26. Rogers, C.A.: The number of lattice points in a set. Proc. Lond. Math. Soc. 3(6), 305–320 (1956)

    Article  MathSciNet  MATH  Google Scholar 

  27. Prudnikov, A.P., Brychkov, Y.A., Marichev, O.I.: Integrals and Series, vol. 1, Elementary Functions. Gordon and Breach, New York (1986)

    MATH  Google Scholar 

  28. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–128 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  29. Shoup, V.: OAEP Reconsidered. J. Cryptol. 15(4), 223–249 (2002). http://shoup.net/papers/oaep.pdf

  30. Södergren, A.: On the Poisson distribution of lengths of lattice vectors in a random lattice. Math. Z. 269(3–4), 945–954 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  31. Schnorr, C.P., Euchner, M.: Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Program. 66(1–3), 181–199 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  32. Vallee, B., Girault, M., Toffin, P.: How to break Okamoto’s cryptosystems by reducing lattices bases. In: Proceedings of Eurocrypt 1988, LNCS, vol. 330, pp. 281–291 (1988)

Download references

Acknowledgements

We thank the anonymous referees for their helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yoshinori Aono.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aono, Y., Agrawal, M., Satoh, T. et al. On the optimality of lattices for the coppersmith technique. AAECC 29, 169–195 (2018). https://doi.org/10.1007/s00200-017-0336-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00200-017-0336-9

Keywords

Navigation