TY - JOUR
T1 - Coppersmith's lattices and “focus groups”
T2 - An attack on small-exponent RSA
AU - Miller, Stephen D.
AU - Narayanan, Bhargav
AU - Venkatesan, Ramarathnam
N1 - Funding Information:
Supported by NSF grants CNS-1526333 and CNS-1815562.Supported by NSF grant DMS-1800521.
Publisher Copyright:
© 2021 Elsevier Inc.
PY - 2021/5
Y1 - 2021/5
N2 - We present a principled technique for reducing the lattice and matrix size in some applications of Coppersmith's lattice method for finding roots of modular polynomial equations. It relies on extrapolating patterns from the actual behavior of Coppersmith's attack for smaller parameter sizes, which can be thought of as “focus group” testing. When applied to the small-exponent RSA problem, our technique reduces lattice dimensions and consequently running times, and hence can be applied to a wider range of exponents. Moreover, in many difficult examples our attack is not only faster but also more successful in recovering the RSA secret key. We include a discussion of subtleties concerning whether or not existing metrics (such as enabling condition bounds) are decisive in predicting the true efficacy of attacks based on Coppersmith's method. Finally, indications are given which suggest certain lattice basis reduction algorithms (such as Nguyen-Stehlé's L2) may be particularly well-suited for Coppersmith's method.
AB - We present a principled technique for reducing the lattice and matrix size in some applications of Coppersmith's lattice method for finding roots of modular polynomial equations. It relies on extrapolating patterns from the actual behavior of Coppersmith's attack for smaller parameter sizes, which can be thought of as “focus group” testing. When applied to the small-exponent RSA problem, our technique reduces lattice dimensions and consequently running times, and hence can be applied to a wider range of exponents. Moreover, in many difficult examples our attack is not only faster but also more successful in recovering the RSA secret key. We include a discussion of subtleties concerning whether or not existing metrics (such as enabling condition bounds) are decisive in predicting the true efficacy of attacks based on Coppersmith's method. Finally, indications are given which suggest certain lattice basis reduction algorithms (such as Nguyen-Stehlé's L2) may be particularly well-suited for Coppersmith's method.
KW - Coppersmith's method
KW - Factoring
KW - Lattice attacks
KW - Lattice basis reduction
KW - Small exponent RSA
UR - http://www.scopus.com/inward/record.url?scp=85100042192&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85100042192&partnerID=8YFLogxK
U2 - 10.1016/j.jnt.2021.01.002
DO - 10.1016/j.jnt.2021.01.002
M3 - Article
AN - SCOPUS:85100042192
SN - 0022-314X
VL - 222
SP - 376
EP - 392
JO - Journal of Number Theory
JF - Journal of Number Theory
ER -