12.4 ATTACK ON RSA [SIMMONS, 1983; DELAURENTIS, 1984]

A conceivable network implementation of the RSA algorithm uses a system public key table as in Figure 12.1.

image

The maintenance of the table, in particular certifying that it is free from malicious entries, is the responsibility of the system manager. It was even suggested that a simplification would result if a single pair of primes p, q could be used throughout the network.

image

Figure 12.1 A system's RSA parameter table.

Proposition 12.7: [Simmons, 1983]:  If pi = p, qi = q, N = pq for all i, knowledge of two public keys ei and ej with 1 = gcd{ei, ej} permits the decipherment of all messages of every user.

Proof: Suppose a single common pair of primes (p, q) is used, then

image

and

image

As 1 = gcd{ei, ej}, there exist integers a, b (by the Euclidean algorithm) such that

image

One of the two integers a, b must be negative (the other positive). Suppose b < 0. If gcd{Cj, N} ≠ 1, Cj has a factor in common with N, which must equal p or q. In this case many ...

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.