2010
DOI: 10.1007/978-3-642-13013-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Implicit Factoring with Shared Most Significant and Middle Bits

Abstract: Abstract.We study the problem of integer factoring given implicit information of a special kind. The problem is as follows: let N 1 = p 1 q 1 and N 2 = p 2 q 2 be two RSA moduli of same bit-size, where q 1 , q 2 are α-bit primes. We are given the implicit information that p 1 and p 2 share t most significant bits. We present a novel and rigorous lattice-based method that leads to the factorization of N 1 and N 2 in polynomial time as soon as t ≥ 2α + 3. Subsequently, we heuristically generalize the method to k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
36
1

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(41 citation statements)
references
References 16 publications
4
36
1
Order By: Relevance
“…To make this assertion more clear, we need to implement our method for more cases. Contrary to the experimental evaluation, we get no cant and middle bits [2]; 6. Application to other RSA moduli types, for example Okamoto-Uchiyama's RSA modulus p 2 q [12] and Takagi's RSA modulus p r q [17].…”
Section: Two Rsa Modulicontrasting
confidence: 73%
“…To make this assertion more clear, we need to implement our method for more cases. Contrary to the experimental evaluation, we get no cant and middle bits [2]; 6. Application to other RSA moduli types, for example Okamoto-Uchiyama's RSA modulus p 2 q [12] and Takagi's RSA modulus p r q [17].…”
Section: Two Rsa Modulicontrasting
confidence: 73%
“…Further, the technique takes care of the case considering some portions of MSBs and LSBs together. Our work is of the same quality (in general) and slightly improved (in certain cases) in comparison to [MAY09,FAU10]. We generalize the ideas of [HOW01] for the lattice based technique that we exploit in this paper and our strategy is different from that of [MAY09,SAR09,FAU10].…”
Section: Introductionmentioning
confidence: 85%
“…However, the technique of [SAR09] could only be applied for k = 2. Recently in [FAU10], the results of [SAR09] has been improved. Note that the work of [FAU10] and certain part of this work (Sections 2, 3, except Section 3.1) [SAR10] are done independently at the similar time.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Ritzenhofen and May [19] and Faugère, Marinier, and Renault [9] give algorithms to factor RSA moduli when it is known that two or more moduli have prime factors that share large numbers of bits in common. Unfortunately, these results seem to apply only when the moduli have prime factors of unbalanced size, whereas in our case, both prime factors have 512 bits.…”
Section: Extension To Implicit Factoringmentioning
confidence: 99%