Skip to main content
Log in

Cryptanalysis of ‘Less Short’ RSA Secret Exponents

  • Published:
Applicable Algebra in Engineering, Communication and Computing Aims and scope

Abstract.

 In some applications of RSA, it is desirable to have a short secret exponent d. Wiener [6], describes a technique to use continued fractions (CF) in a cryptanalytic attack on an RSA cryptosystem having a ‘short’ secret exponent. Let n=p ⋅ q be the modulus of the system. In the typical case that G=gcd(p−1, q−1) is small. Wiener’s method will give the secret exponent d when d does not exceed (approximately) n 1/4.

Here, we describe a general method to compute the CF-convergents of the continued fraction expansion of the same number as in Wiener (which has denominator d ⋅ G) up to the point where the denominator of the CF-convergent exceeds approximately n 1/4. When d<n 1/4 this technique determines d, p, and q as does Wiener’s method. For larger values of d there is still information available on the secret key. An estimate is made of the remaining workload to determine d, p and q. Roughly speaking this workload corresponds to an exhaustive search for about 2r+8 bit, where r=ln2d/n 1/4.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Additional information

Received: September 30, 1996; revised version: March 7, 1997

Rights and permissions

Reprints and permissions

About this article

Cite this article

Verheul, E., van Tilborg, H. Cryptanalysis of ‘Less Short’ RSA Secret Exponents. AAECC 8, 425–435 (1997). https://doi.org/10.1007/s002000050082

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s002000050082

Navigation