Low Exponent Attack Against Elliptic Curve RSA
暂无分享,去创建一个
[email protected]?astad showed that low exponent RSA is not secure if the same message is encrypted to several receivers. This is true even if time-stamp is used for each receiver. For example, let e = 3. Then if the number of receivers is 7, the eavesdropper can find the plaintext from the seven ciphertexts of each receiver. This paper shows that elliptic curve RSA is not secure in the same scenario. It is shown that the KMOV scheme and Demytko's scheme are not secure if e = 5, n >= 2^1^0^2^4 and the number of receivers is 428. In Demytko's scheme, e can take the value of 2. In this case, this system is not secure if the number of receiver is 11 for n >= 2^1^7^5.
[1] David M. Bressoud. Factorization and Primality Testing , 1989 .
[2] Johan Håstad,et al. On Using RSA with Low Exponent in a Public Key Network , 1985, CRYPTO.
[3] N. Demytko,et al. A New Elliptic Curve Based Analogue of RSA , 1994, EUROCRYPT.
[4] Tatsuaki Okamoto,et al. New Public-Key Schemes Based on Elliptic Curves over the Ring Zn , 1991, CRYPTO.
[5] Kaoru Kurosawa,et al. Low Exponent Attack Against Elliptic Curve RSA , 1994, Inf. Process. Lett..