User:Wiener's Attack

From Wikipedia, the free encyclopedia

Introduction[edit]

The system of RSA is frequently used for security application such as email, credit card payments, login network access, etc. One of RSA attacks is suggested by Michael Wiener. He uses continued fraction method to exploit an error made in the use of RSA. The example of situation is when we are doing transactions using credit card or for mobile devices such as phone.

Before we discuss how Wiener's attack works, first we will explain how RSA works briefly. Let Alice and Bob be two people who want to make communication securely. In more specific, Alice wants to send a message to Bob which only Bob can read. First Bob chooses two primes p and q. Then he calculates the RSA modulus N = pq. This RSA modulus which is public and together with the encryption exponent e will form the public key pair (e,N). By making this information public, it will allow anyone to encrypt the message. The decryption exponent d is satisfied , where , Euler’s phi function (note: this is the order of multiplicative group ). The encryption exponent e and also must be relatively prime so that there is a modular inverse. The factorization of N and the private key d are kept secret, so that only Bob can decrypt the message. We can the private key pair as (d, N). Using Chinese Remainder Theorem, one can efficiently recover the secret key d if (s)he knows the factorization of N. By having the secret key d, one can efficiently factor the modulus of N.

In RSA Cryptosystem, the one who sends the message might tend to use a small value of d, rather than a large random number to improve the RSA decryption performance in the matter of running-time. However, by using Wiener’s attack, we can see that choosing a small value for d will result an insecure system in which we can recover all secret information. Another person, called “the attacker” will break the RSA system. This break is based on Wiener’s Theorem, which in general provides a small value of d. Wiener has proved that the attacker may efficiently find d when .
In addition to Wiener's finding in RSA-attack, he also found a number of techniques that allow fast decryption and does not apply to his attack. Two sampling techniques are described as follows.
Choosing large public key: By replacing by , where for some large of . When is large enough, i.e. , then Wiener’s attack can not be installed regardless of how small is.
Using Chinese Remainder Theorem: Suppose one chooses d such that both and are small, then a fast decryption of can be done as follows:
1. First compute and .
2. Use the Chinese Remainder Theorem to compute the unique value of which satisfies and . The result of satisfies as needed. The point is that the attack by Wiener’s attack does not apply here because the value of can be large.

How Wiener's Attack Works[edit]

Since

,

There exist an integer K such that


Define to be included in the equation above which gives:


Defining and , and substituting into the above gives:

.

Divided by :

, where .

So, is close underestimate of , and the former is composed entirely of public information. Note that this algorithm finds fractions in their lowest terms. However, a method of checking a guess is still required. Assuming that (a reasonable asumption unles is large) the last equation above may be written as:


By using simple algebraic manipulation and identities, a guess can be checked for accuracy.

Example[edit]

Suppose that the public keys are
If we want to attack, we have to determine .
By using Wiener Theorem and continued fractions to approx , first we try to find the continued fractions of .

We know that



According to the continued fractions expansion of , the all convergents are:



We can verify that the first convergents do not produce a factorizations of . However, the convergent yield



Now, if we solve the equation





Then we find the roots which are . Therefore we have found the factorization.

.

Notice that, for the modulus , the Wiener's Theorem will work if

.

Theorem (M. Wiener)[edit]

Let with . Let .
Given with , the attacker can efficiently recover .

Proof[edit]

The proof is based on approximations using continued fractions. Since , there exists a such that . Therefore



Hence, is an approximation of . Although the attacker does not know , he may use to approximate it. Indeed, since

and , we have:




Using N in place of we obtain:






Now, , so . Since , so , then we obtain:



Since and . Hence we obtain:



Since then , we obtain:

, so

From (1) and (2), we can conclude that



Notes[edit]

References[edit]

  • R. Stinson, Douglas (2002). Cryptography Theory and Practice (2e ed.). A CRC Press Company. pp. 200–204. ISBN 1-58488-206-9.