Attacks on RSA using Lattice reduction techniques (LLL)
-
Upload
david-wong -
Category
Science
-
view
554 -
download
2
Transcript of Attacks on RSA using Lattice reduction techniques (LLL)
![Page 1: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/1.jpg)
Lattice Reduction Techniques To Attack
RSADavid Wong
March 2015
University of Bordeaux
![Page 2: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/2.jpg)
![Page 3: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/3.jpg)
![Page 4: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/4.jpg)
![Page 5: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/5.jpg)
![Page 6: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/6.jpg)
ATTACKS
![Page 7: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/7.jpg)
Attacks on the Implementation or the Mathematics.
•Recover the plaintext•Recover the private key
![Page 8: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/8.jpg)
A Relaxed Model
• We know a part of the message• We know an approximation of one of
the prime• The private exponent is too small
![Page 9: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/9.jpg)
LATTICE
![Page 10: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/10.jpg)
![Page 11: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/11.jpg)
![Page 12: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/12.jpg)
![Page 13: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/13.jpg)
![Page 14: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/14.jpg)
![Page 15: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/15.jpg)
![Page 16: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/16.jpg)
COPPERSMITH
![Page 17: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/17.jpg)
![Page 18: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/18.jpg)
« le password du jour : cupcake »
![Page 19: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/19.jpg)
« le password du jour : cupcake »
![Page 20: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/20.jpg)
![Page 21: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/21.jpg)
HOWGRAVE-GRAHAM
![Page 22: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/22.jpg)
HOWGRAVE-GRAHAM
![Page 23: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/23.jpg)
![Page 24: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/24.jpg)
LLL reduction:• It only does integer linear
operations on the basis vectors
• The shortest vector of the output basis is bound
![Page 25: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/25.jpg)
![Page 26: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/26.jpg)
![Page 27: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/27.jpg)
Those polynomials achieve two things:• They have the same root 𝑥0 but modulo 𝑁𝑚
• Each iteration introduce a new monomial
![Page 28: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/28.jpg)
![Page 29: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/29.jpg)
![Page 30: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/30.jpg)
![Page 31: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/31.jpg)
![Page 32: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/32.jpg)
![Page 33: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/33.jpg)
![Page 34: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/34.jpg)
![Page 35: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/35.jpg)
![Page 36: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/36.jpg)
COPPERSMITH
![Page 37: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/37.jpg)
BONEH-DURFEE
![Page 38: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/38.jpg)
![Page 39: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/39.jpg)
![Page 40: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/40.jpg)
![Page 41: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/41.jpg)
![Page 42: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/42.jpg)
![Page 43: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/43.jpg)
![Page 44: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/44.jpg)
![Page 45: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/45.jpg)
HOWGRAVE-GRAHAM
![Page 46: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/46.jpg)
![Page 47: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/47.jpg)
![Page 48: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/48.jpg)
![Page 49: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/49.jpg)
![Page 50: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/50.jpg)
HERRMAN AND MAY: UNRAVELLED LINEARIZATION
![Page 51: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/51.jpg)
![Page 52: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/52.jpg)
![Page 53: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/53.jpg)
BONEH-DURFEE BOUND
![Page 54: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/54.jpg)
CONCLUSIONS
![Page 55: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/55.jpg)
![Page 56: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/56.jpg)
![Page 57: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/57.jpg)
![Page 58: Attacks on RSA using Lattice reduction techniques (LLL)](https://reader033.fdocuments.in/reader033/viewer/2022051721/58730c731a28ab99088b6ed3/html5/thumbnails/58.jpg)