Abstract
Variants of the Rabin cryptosystem are built to overcome the decryption failure problem encountered by the cryptosystem. In this paper, we perform a theoretical simple power analysis on one of the variants that operates its decryption procedure via modular multiplication where the moduli \(N_1=pq\) is kept secret while the moduli \(N=p^2q\) is public. The attack utilizes Legendre’s theorem of continued fraction to successfully retrieve the secret key of the cryptosystem. An example of the attack is also included in this paper.
Similar content being viewed by others
References
Ariffin, M., Asbullah, M., Abu, N., Mahad, Z.: A new efficient asymmetric cryptosystem based on the integer factorization problem of \({N}=p^2q\). Malays. J. Math. Sci. 7(S), 19–37 (2013)
Ariffin, M., Mahad, Z.: \(AA_{\beta }\) Public Key Cryptosystem–A Comparative Analysis against RSA and ECC. International Journal of Digital Content Technology and its Applications 7(7), 174–182 (2013)
Asbullah, M., Ariffin, M.: Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo \(N=p^2q\). In: 4th International Cryptology and Information Security Conference (2014)
Asbullah, M., Ariffin, M.: Fast decryption method for a Rabin primitive based cryptosystem. Int. J. Adv. Comput. Technol. 6(1), 56–67 (2014)
Boneh, D., Durfee, G., Howgrave-Graham, N.: Factoring \(N= p^r q\). In: Advances in Cryptology, Crypto99, pp. 326–337. Springer, Berlin (1999)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology, CRYPTO99, pp. 388–397. Springer, Berlin (1999)
Kurosawa, K., Ito, T., Takeuchi, M.: Public key cryptosystem using a reciprocal number with the same intractability as factoring a large number. Cryptologia 12(4), 225–233 (1988)
Mahad, Z., Ariffin, M.: \(AA_\beta \) public-key cryptosystem—a practical implementation of the new asymmetric cryptosystem. Int. J. Digit. Content Technol. Appl. 7(7), 165–173 (2013)
Mahad, Z., Ariffin, M., Asbullah, M.: A new improvement method on Rabin cryptosystem. In: International Conference on Computer Engineering and Mathematical Sciences (2014)
Meneves, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, New York (1997)
Nishioka, M., Satoh, H., Sakurai, K.: Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring. In: Information Security and Cryptology, ICISC 2001, pp. 81–102. Springer, Berlin (2002)
Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: Advances in Cryptology, EUROCRYPT’98, pp. 308–318. Springer, Berlin (1998)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology, EUROCRYPT99, pp. 223–238. Springer, Berlin (1999)
Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. Tech. Rep, DTIC Document (1979)
Saldamli, G., Koç, C.K.: Spectral modular exponentiation. In: 18th IEEE Symposium on Computer Arithmetic. ARITH’07, pp. 123–132. IEEE, New York (2007)
Schmidt, W.M.: Diophantine Approximation, vol. 785. Springer, Berlin (1996)
Schmidt-Samoa, K., Takagi, T.: Paillier’s cryptosystem modulo \(p^2q\) and its applications to trapdoor commitment schemes. In: Progress in Cryptology—Mycrypt 2005, pp. 296–313. Springer, Berlin (2005)
Takagi, T.: Fast RSA-type cryptosystem modulo \(p^kq\). In: Advances in Cryptology, CRYPTO’98, pp. 318–326. Springer, Berlin (1998)
Williams, H.: A modification of the RSA public-key encryption procedure (Corresp.). IEEE Trans. Inf. Theory 26(6), 726–729 (1980)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Abd Ghafar, A.H., Ariffin, M.R.K. SPA on Rabin variant with public key \(N=p^2q\) . J Cryptogr Eng 6, 339–346 (2016). https://doi.org/10.1007/s13389-016-0118-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13389-016-0118-5