1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate.

Slides:



Advertisements
Similar presentations
RSA.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
7. Asymmetric encryption-
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
and Factoring Integers (I)
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
and Factoring Integers
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
RSA Question 2 Bob thinks that p and q are primes but p isn’t. Then, Bob thinks ©Bob:=(p-1)(q-1) = Á(n). Is this true ? Bob chooses a random e (1 < e
Codes, Ciphers, and Cryptography-RSA Encryption
Lecture 6: Public Key Cryptography
Public Key Model 8. Cryptography part 2.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Topic 18: RSA Implementation and Security
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
The RSA Algorithm Rocky K. C. Chang, March
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Prime Numbers Prime numbers only have divisors of 1 and self
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Lecture 5-6 The RSA and Rabin Algorithms. The possibility of the public key cryptosystem was first publicly suggested by Diffie and Hellman. However,
RSA Ramki Thurimella.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Computer and Network Security Rabie A. Ramadan Lecture 6.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Public Key Encryption Major topics The RSA scheme was devised in 1978
PUBLIC-KEY ENCRYPTION Focusing on RSA
Public Key Cryptosystems - RSA
Analysis of the RSA Encryption Algorithm
Presentation transcript:

1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate Studies/Faculty of IT, Amman, Jordan 2 Al-al Bayt University/Department of Information Systems, Amman, Jordan

2 ABSTRACT l The security on many public key encryption schemes relied on the intractability of finding the integer factoring problem. However, there is a great deal of research related to the RSA factoring scheme compared with the other similar schemes such as Rabin factoring algorithm. This paper will present a new technique for factoring the Rabin scheme. The suggested algorithm aims to factoring the Rabin modulus using a new idea that based on a new idea of attack. The new idea claimed to be more efficient than the well known algorithm that is Pollard rho algorithm since it is faster and takes less running time.

3 INTRODUCTION l Factoring an integer modulus means find its prime numbers and. However, factoring the modulus is in fact a hard problem and most of the popular public key encryption schemes are relied on [2], but surly not impossible because the RSA-120 is factored using quadratic sieve by Thomsan, Bruce, Arjen and Mark [17]. Also, the RSA-140 is factored using number field sieve by Cavallar, Dodson, Lenstra, Leyland, Lioen, Montgemery, Murphy and Zimmermann [4].

4 Introduction (Continue) l While RSA-155 is factored in 1999, also, the RSA-160 is factored in April 2003, and the RSA-576 is factored in December 2003 by Eric [7]. The RSA-200 is factored in 2004 the RSA-640 is factored in November 2, 2005 by Bahr, Boehm, Franke and Kleinjung [1]. The factors of RSA-640 are verified by RSA Laboratories. The relation between factoring and the public key encryption schemes is one of the main reasons that researchers are interested in factoring algorithms [6].

5 Introduction (Continue) l The first attractive event in the history of public key cryptography occurred in 1976 when Diffie-Hellman [5] published their paper named new direction in cryptography. This paper suggested a great idea for public key cryptography and to construct a scheme that is not need a secure channel, but provides the opportunity for secret communication. However, Diffie-Hellman suggested such mechanism for distributing the private key to be employed in the traditional schemes on insecure communication channel [3].

6 Introduction (Continue) l In 1978 Rivest, Shamir and Adleman (RSA) [13] introduced the first practical scheme which is the most popular public key scheme. The security of the RSA scheme is based on the intractability of factoring the modulus which is the product of two large prime numbers that is a difficult mathematical problem to solve. In 1979,

7 Introduction (Continue) l Rabin [12] suggested a scheme also relied on the factoring of a composite modulus, which is the product of large prime numbers and the result of decryption scheme is four messages; just one from them is the original message. In 1992, Shimada [16] enhanced Rabin scheme using the extension Rabin public key encryption scheme employing certain assumption in a private key utilizing Jacobi symbol.

8 Introduction (Continue) l In 1998, Okamoto [9] proposed a new public key cryptosystem as secure as factoring relied on RSA and Rabin schemes. In 1999, Pointcheval [10] presented a new public key encryption scheme based on the dependent RSA and Rabin Schemes. In 2006, Sahadeo Padhye [14] modified dependent RSA and Rabin public key cryptosystem using certain conditions to public and private keys.

9 Introduction (Continue) l All of the schemes mentioned above relied on intractability of the integer factoring. However, there is great research concerning RSA factoring modulus compared with the other mentioned schemes such as Rabin scheme. Therefore, in this paper we suggest an efficient algorithm to factorize the Rabin scheme. Through define a functional problem of attack.

10 RABIN SCHEME l In 1979, Rabin [12] developed a public key cryptosystem that is based on the difficulty of computing square roots mod some integer. Rabin public key encryption scheme is the first example of a provably secure public key encryption scheme against chosen massage attacks, assuming that the factoring problem is computationally intractable, and it is hard to find the prime factors of n = p *q. Rabin scheme is a good alternative to the RSA scheme, though both depend on the difficulty of integer. The Rabin scheme is as follows:

11 KEY GENERATION ALGORITHM To generate the keys entity A should do the following: l Randomly chooses two large prime numbers p and q which satisfy 3 mod 4. l Computes the modulus n = p * q. l Determine entity A public and private key. The pair (p, q) is the private key. While the modulus n is the public key.

12 PUBLIC KEY ENCRYPTION ALGORITHM Entity B encrypts a message m for entity A which entity A decrypts. Encryption: entity B should do the following: l Obtain entity A public key n. l Represent the message m as an integer in the interval 0..n l Compute c = m 2 mod n l Send the encrypted message c to entity A.

13 PUBLIC KEY ENCRYPTION ALGORITHM (Continue) Decryption: to recover the message m from the cipher text c. Entity A must do the following: l Compute the four square roots of m 1, m 2, m 3, m 4 of c mod n as follows: n w 1 = c (p+1)/4 mod p n w 2 = p – w 1 n w 3 = c (q+1)/4 mod q n w 4 = q – w 3

14 PUBLIC KEY ENCRYPTION ALGORITHM (Continue) l Compute a = q(q -1 mod p) l Compute b = p(p -1 mod q) l Compute four solutions m 1, m 2, m 3, m 4 as follows: n m 1 = (a*w 1 + b*w 3 ) mod n n m 2 = (a*w 1 + b*w 4 ) mod n n m 3 = (a*w 2 + b*w 3 ) mod n n m 4 = (a*w 2 + b*w 4 ) mod n n Note that one from these solutions is the result

15 Example l Key generation: suppose that entity A selects the prime numbers p = 43 and q = 47 with 43 ≡ 47 ≡ 3 mod 4. Then he finds the Rabin modulus n = p * q = A’s public key is 2021 while A’s private key is (p=43, q = 47).

16 Example (continue) l Encryption: Suppose entity B obtain A public key (n = 2021) and he determines a message m = 741 to be encrypted and finds c = mod 2021 then send c = 1390 to entity A.

17 Example (Continue) l Decryption: To recover and obtain the original message m entity A should first compute the four square roots w 1, w 2, w 3, w 4 using square and multiply method [8]: n w 1 = 1390 (43+1)/4 = mod 43 = 10 n W 2 43 – 10 = 33 n W 3 = 1390 (47+1)/4 = mod 47 = 36 n W 4 = 47 – 36 = 11

18 Example (Continue) l Entity A then computes a = 47(47 -1 mod 43) = 11 * 47 = 517 and b = 43(43 -1 mod 47) = 35*43 = 1505 using Baghdad method for multiplicative inverse [15] then entity A computes four solutions as follows:

19 Example (Continue) l m 1 = (517* *36) mod 2021 = 741 l m 2 = (517* *11) mod 2021 = 1515 l m 3 = (517* *36) mod 2021 = 506 l m 4 = (517* *11) mod 2021 = 1280 Note that only m 1 is represented the original message m.

20 Pollard rho Factoring Method l This method is based on a combination of two ideas that are also useful for various other factoring methods [11].

21 Algorithm l set a = b = 2 ; l for I = 1, 2,…, do n a = a mod n n b = b mod n n d = gcd(a-b, n); –If 1 < d < n then return d and terminate with success –if d = n then terminate the algorithm with failure

22 Example l Pollard rho algorithm for finding a non- trivial factor of n = The following table lists the values of variables a, b, and d and at the end of each an iteration of step for loop of algorithm.

23 Example (Continue) a bb l Hence two non-trivial factors of are 743 and /743=613.

24 The Proposed Factoring Algorithm l Suppose n = p*q is the Rabin modulus to be factored, such that p ≡ q ≡ 3 mod 4. The following are the steps of the suggested algorithm that break the Rabin modulus.

25 Algorithm var n, x, j, y, z : integer ; ok : boolean ; begin z = sqrt(flooring(n)); if z is odd then x = (n – z*2) + 1 ; else x = (n – z*2); ok : true; while ok & x > (z*2) do { j = n-x+1; y = j/2; if (sqrt(y 2 -n = sqrt(y 2 -n) then ok = false; else x = x-2; } return x; end.

26 Example l Suppose that the Rabin modulus n = where p ≡ q ≡ 3 mod 4, z = sqrt(flooring(n)) = 675 as long as z is odd, then we compute x = (n - z*2) +1 = Now, we can trace the rest of the algorithm as follows: nzxjyr fraction fraction fraction integer=65 l Thus y – r = p or q l 678 – 65 = 613 = p l /613=743

27 Conclusions l We are introduced a new algorithm for factoring the Rabin scheme based on the definition of the Blum integers and on a functional problem of attack scheme. We find that the definition of the Blum integers is a great contribution to attacking the Rabin scheme. Also, we find that the definition of the Blum numbers will open many other ways to attack not only the Rabin scheme but also other schemes based on the difficulty of integer factoring. The suggested algorithm is one from these. We claim that the proposed algorithm is more efficient than the well known algorithm that is Pollard rho algorithm even with long modulus.