Attacks on RSA using Lattice reduction techniques (LLL)

58
Lattice Reduction Techniques To Attack RSA David Wong March 2015 University of Bordeaux

Transcript of Attacks on RSA using Lattice reduction techniques (LLL)

Page 1: Attacks on RSA using Lattice reduction techniques (LLL)

Lattice Reduction Techniques To Attack

RSADavid Wong

March 2015

University of Bordeaux

Page 2: Attacks on RSA using Lattice reduction techniques (LLL)
Page 3: Attacks on RSA using Lattice reduction techniques (LLL)
Page 4: Attacks on RSA using Lattice reduction techniques (LLL)
Page 5: Attacks on RSA using Lattice reduction techniques (LLL)
Page 6: Attacks on RSA using Lattice reduction techniques (LLL)

ATTACKS

Page 7: Attacks on RSA using Lattice reduction techniques (LLL)

Attacks on the Implementation or the Mathematics.

•Recover the plaintext•Recover the private key

Page 8: Attacks on RSA using Lattice reduction techniques (LLL)

A Relaxed Model

• We know a part of the message• We know an approximation of one of

the prime• The private exponent is too small

Page 9: Attacks on RSA using Lattice reduction techniques (LLL)

LATTICE

Page 10: Attacks on RSA using Lattice reduction techniques (LLL)
Page 11: Attacks on RSA using Lattice reduction techniques (LLL)
Page 12: Attacks on RSA using Lattice reduction techniques (LLL)
Page 13: Attacks on RSA using Lattice reduction techniques (LLL)
Page 14: Attacks on RSA using Lattice reduction techniques (LLL)
Page 15: Attacks on RSA using Lattice reduction techniques (LLL)
Page 16: Attacks on RSA using Lattice reduction techniques (LLL)

COPPERSMITH

Page 17: Attacks on RSA using Lattice reduction techniques (LLL)
Page 18: Attacks on RSA using Lattice reduction techniques (LLL)

« le password du jour : cupcake »

Page 19: Attacks on RSA using Lattice reduction techniques (LLL)

« le password du jour : cupcake »

Page 20: Attacks on RSA using Lattice reduction techniques (LLL)
Page 21: Attacks on RSA using Lattice reduction techniques (LLL)

HOWGRAVE-GRAHAM

Page 22: Attacks on RSA using Lattice reduction techniques (LLL)

HOWGRAVE-GRAHAM

Page 23: Attacks on RSA using Lattice reduction techniques (LLL)
Page 24: Attacks on RSA using Lattice reduction techniques (LLL)

LLL reduction:• It only does integer linear

operations on the basis vectors

• The shortest vector of the output basis is bound

Page 25: Attacks on RSA using Lattice reduction techniques (LLL)
Page 26: Attacks on RSA using Lattice reduction techniques (LLL)
Page 27: Attacks on RSA using Lattice reduction techniques (LLL)

Those polynomials achieve two things:• They have the same root 𝑥0 but modulo 𝑁𝑚

• Each iteration introduce a new monomial

Page 28: Attacks on RSA using Lattice reduction techniques (LLL)
Page 29: Attacks on RSA using Lattice reduction techniques (LLL)
Page 30: Attacks on RSA using Lattice reduction techniques (LLL)
Page 31: Attacks on RSA using Lattice reduction techniques (LLL)
Page 32: Attacks on RSA using Lattice reduction techniques (LLL)
Page 33: Attacks on RSA using Lattice reduction techniques (LLL)
Page 34: Attacks on RSA using Lattice reduction techniques (LLL)
Page 35: Attacks on RSA using Lattice reduction techniques (LLL)
Page 36: Attacks on RSA using Lattice reduction techniques (LLL)

COPPERSMITH

Page 37: Attacks on RSA using Lattice reduction techniques (LLL)

BONEH-DURFEE

Page 38: Attacks on RSA using Lattice reduction techniques (LLL)
Page 39: Attacks on RSA using Lattice reduction techniques (LLL)
Page 40: Attacks on RSA using Lattice reduction techniques (LLL)
Page 41: Attacks on RSA using Lattice reduction techniques (LLL)
Page 42: Attacks on RSA using Lattice reduction techniques (LLL)
Page 43: Attacks on RSA using Lattice reduction techniques (LLL)
Page 44: Attacks on RSA using Lattice reduction techniques (LLL)
Page 45: Attacks on RSA using Lattice reduction techniques (LLL)

HOWGRAVE-GRAHAM

Page 46: Attacks on RSA using Lattice reduction techniques (LLL)
Page 47: Attacks on RSA using Lattice reduction techniques (LLL)
Page 48: Attacks on RSA using Lattice reduction techniques (LLL)
Page 49: Attacks on RSA using Lattice reduction techniques (LLL)
Page 50: Attacks on RSA using Lattice reduction techniques (LLL)

HERRMAN AND MAY: UNRAVELLED LINEARIZATION

Page 51: Attacks on RSA using Lattice reduction techniques (LLL)
Page 52: Attacks on RSA using Lattice reduction techniques (LLL)
Page 53: Attacks on RSA using Lattice reduction techniques (LLL)

BONEH-DURFEE BOUND

Page 54: Attacks on RSA using Lattice reduction techniques (LLL)

CONCLUSIONS

Page 55: Attacks on RSA using Lattice reduction techniques (LLL)
Page 56: Attacks on RSA using Lattice reduction techniques (LLL)
Page 57: Attacks on RSA using Lattice reduction techniques (LLL)
Page 58: Attacks on RSA using Lattice reduction techniques (LLL)