期刊文献+

Quantum Polynomial-Time Fixed-Point Attack for RSA 被引量:3

Quantum Polynomial-Time Fixed-Point Attack for RSA
下载PDF
导出
摘要 Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed. Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum com- puting environment. Shor proposed a well- known factoring algorithm by finding the prime factors of a number n--pq, which is exponentially faster than the best known clas- sical algorithm. The idea behind Shor's quan- tum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd(ar/2+1,n)=p or q. For odd values of r it is assumed that the factors of n cannot be found (since ar/2 is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new poly- nomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n, The probability of success of the new algo- rithm is greater than 4φ(r)/π2r ,exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In con- strast to the existing quantum algorithm for at- tacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed.
出处 《China Communications》 SCIE CSCD 2018年第2期25-32,共8页 中国通信(英文版)
基金 partially supported by he State Key Program of National Natural Science of China No. 61332019 Major State Basic Research Development Program of China (973 Program) No. 2014CB340601 the National Science Foundation of China No. 61202386, 61402339 the National Cryptography Development Fund No. MMJJ201701304
关键词 information security cryptogra-phy RSA fixed-point quantum computing 多项式时间 RSA 攻击 Fourier 定点 公共密钥 安全分析 量算法
  • 相关文献

参考文献5

二级参考文献53

  • 1余位驰,缪祥华,何大可.NTRU译码错误研究[J].铁道学报,2005,27(5):61-66. 被引量:4
  • 2Yao Jun Zeng Guihua.Enhanced NTRU cryptosystem eliminating decryption failures[J].Journal of Systems Engineering and Electronics,2006,17(4):890-895. 被引量:3
  • 3王宇平,李英华.求解TSP的量子遗传算法[J].计算机学报,2007,30(5):748-755. 被引量:71
  • 4LU MingXin,LAI XueJia,XIAO GuoZhen,QIN Lei.Symmetric-key cryptosystem with DNA technology[J].Science in China(Series F),2007,50(3):324-333. 被引量:14
  • 5KOCHER P C. Timing Attacks on Implementa- tions of Diffie-Hellman, RSA, DSS, and Other Systems[C]// Proceedings of CRYPTO 1996: August 1996, Santa Barbara, California, USA. Berlin: Springer, 1996:104-113.
  • 6KOCHER P, JAFFE J, JUN B. Differential power analysis[C]// Proceedings of CRYPTO 1999: August 1999, Santa Barbara, California, USA. Berlin: Springer, 1999: 388-397.
  • 7PAGE D. Theoretical use of Cache memory as a cryptanalytic side-channel[R]. Technical ReportCSTR-02-003, Department of Computer Sci- ence, University of Bristol, 2002.
  • 8PERCIVAL C. Cache missing for fun and prof- it[EB/OL]. < http://www.daemonology.net/pa- pers/htt,pdf>. 2005.
  • 9ACIICMEZ O., SCHINDLER W. A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenS- SL[C]// Proceedings of the CT-RSA 2008: April 2008, San Francisco, CA, USA. Berlin: Springer, 2008: 256-273.
  • 10ACII(~MEZ O, BRUMLEY B B, GRABHER P. New Results on Instruction Cache Attacks[C]//Pro- ceedings of the CHES 2010: Santa Barbara, USA. Berlin: Springer, 2010:110-124.

共引文献23

同被引文献13

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部