Introduction

edit

The system of RSA is frequently used for security application such as email, credit card payments, login network access, etc. One of RSA attacks is suggested by Michael Wiener. He uses continued fraction method to exploit an error made in the use of RSA. The example of situation is when we are doing transactions using credit card or for mobile devices such as phone.

Before we discuss how Wiener's attack works, first we will explain how RSA works briefly. Let Alice and Bob be two people who want to make communication securely. In more specific, Alice wants to send a message to Bob which only Bob can read. First Bob chooses two primes p and q. Then he calculates the RSA modulus N = pq. This RSA modulus which is public and together with the encryption exponent e will form the public key pair (e,N). By making this information public, it will allow anyone to encrypt the message. The decryption exponent d is satisfied  , where  , Euler’s phi function (note: this is the order of multiplicative group  ). The encryption exponent e and   also must be relatively prime so that there is a modular inverse. The factorization of N and the private key d are kept secret, so that only Bob can decrypt the message. We can the private key pair as (d, N). Using Chinese Remainder Theorem, one can efficiently recover the secret key d if (s)he knows the factorization of N. By having the secret key d, one can efficiently factor the modulus of N.

In RSA Cryptosystem, the one who sends the message might tend to use a small value of d, rather than a large random number to improve the RSA decryption performance in the matter of running-time. However, by using Wiener’s attack, we can see that choosing a small value for d will result an insecure system in which we can recover all secret information. Another person, called “the attacker” will break the RSA system. This break is based on Wiener’s Theorem, which in general provides a small value of d. Wiener has proved that the attacker may efficiently find d when  .
In addition to Wiener's finding in RSA-attack, he also found a number of techniques that allow fast decryption and does not apply to his attack. Two sampling techniques are described as follows.
Choosing large public key: By replacing   by  , where   for some large of  . When   is large enough, i.e.  , then Wiener’s attack can not be installed regardless of how small   is.
Using Chinese Remainder Theorem: Suppose one chooses d such that both  and   are small, then a fast decryption of   can be done as follows:
1. First compute   and  .
2. Use the Chinese Remainder Theorem to compute the unique value of   which satisfies   and  . The result of   satisfies   as needed. The point is that the attack by Wiener’s attack does not apply here because the value of   can be large.

How Wiener's Attack Works

edit

Since

 ,

There exist an integer K such that

 

Define   to be included in the equation above which gives:

 

Defining   and  , and substituting into the above gives:

 .

Divided by  :

 , where  .

So,   is close underestimate of  , and the former is composed entirely of public information. Note that this algorithm finds fractions in their lowest terms. However, a method of checking a guess is still required. Assuming that   (a reasonable asumption unles   is large) the last equation above may be written as:

 

By using simple algebraic manipulation and identities, a guess can be checked for accuracy.

Example

edit

Suppose that the public keys are  
If we want to attack, we have to determine  .
By using Wiener Theorem and continued fractions to approx  , first we try to find the continued fractions of  .

We know that

 

According to the continued fractions expansion of  , the all convergents   are:

 

We can verify that the first convergents do not produce a factorizations of  . However, the convergent   yield

 

Now, if we solve the equation

 
 
 

Then we find the roots which are  . Therefore we have found the factorization.

 .

Notice that, for the modulus  , the Wiener's Theorem will work if

 .

Theorem (M. Wiener)

edit

Let   with  . Let  .
Given   with  , the attacker can efficiently recover  .

Proof

edit

The proof is based on approximations using continued fractions. Since  , there exists a   such that  . Therefore

 

Hence,   is an approximation of  . Although the attacker does not know  , he may use   to approximate it. Indeed, since

  and  , we have:

 
 

Using N in place of   we obtain:

 
 
 
 

Now,  , so  . Since  , so  , then we obtain:

 
 

Since   and  . Hence we obtain:

 

Since   then  , we obtain:

 , so  

From (1) and (2), we can conclude that

 


Notes

edit

References

edit
  • R. Stinson, Douglas (2002). Cryptography Theory and Practice (2e ed.). A CRC Press Company. pp. 200–204. ISBN 1-58488-206-9.