58
Lattice Reduction Techniques To Attack RSA David Wong March 2015 University of Bordeaux

Attacks on RSA using Lattice reduction techniques (LLL)

Embed Size (px)

Citation preview

Page 1: Attacks on RSA using Lattice reduction techniques (LLL)

Lattice Reduction Techniques To Attack

RSADavid Wong

March 2015

University of Bordeaux

Page 2: Attacks on RSA using Lattice reduction techniques (LLL)
Page 3: Attacks on RSA using Lattice reduction techniques (LLL)
Page 4: Attacks on RSA using Lattice reduction techniques (LLL)
Page 5: Attacks on RSA using Lattice reduction techniques (LLL)
Page 6: Attacks on RSA using Lattice reduction techniques (LLL)

ATTACKS

Page 7: Attacks on RSA using Lattice reduction techniques (LLL)

Attacks on the Implementation or the Mathematics.

•Recover the plaintext•Recover the private key

Page 8: Attacks on RSA using Lattice reduction techniques (LLL)

A Relaxed Model

• We know a part of the message• We know an approximation of one of

the prime• The private exponent is too small

Page 9: Attacks on RSA using Lattice reduction techniques (LLL)

LATTICE

Page 10: Attacks on RSA using Lattice reduction techniques (LLL)
Page 11: Attacks on RSA using Lattice reduction techniques (LLL)
Page 12: Attacks on RSA using Lattice reduction techniques (LLL)
Page 13: Attacks on RSA using Lattice reduction techniques (LLL)
Page 14: Attacks on RSA using Lattice reduction techniques (LLL)
Page 15: Attacks on RSA using Lattice reduction techniques (LLL)
Page 16: Attacks on RSA using Lattice reduction techniques (LLL)

COPPERSMITH

Page 17: Attacks on RSA using Lattice reduction techniques (LLL)
Page 18: Attacks on RSA using Lattice reduction techniques (LLL)

« le password du jour : cupcake »

Page 19: Attacks on RSA using Lattice reduction techniques (LLL)

« le password du jour : cupcake »

Page 20: Attacks on RSA using Lattice reduction techniques (LLL)
Page 21: Attacks on RSA using Lattice reduction techniques (LLL)

HOWGRAVE-GRAHAM

Page 22: Attacks on RSA using Lattice reduction techniques (LLL)

HOWGRAVE-GRAHAM

Page 23: Attacks on RSA using Lattice reduction techniques (LLL)
Page 24: Attacks on RSA using Lattice reduction techniques (LLL)

LLL reduction:• It only does integer linear

operations on the basis vectors

• The shortest vector of the output basis is bound

Page 25: Attacks on RSA using Lattice reduction techniques (LLL)
Page 26: Attacks on RSA using Lattice reduction techniques (LLL)
Page 27: Attacks on RSA using Lattice reduction techniques (LLL)

Those polynomials achieve two things:• They have the same root 𝑥0 but modulo 𝑁𝑚

• Each iteration introduce a new monomial

Page 28: Attacks on RSA using Lattice reduction techniques (LLL)
Page 29: Attacks on RSA using Lattice reduction techniques (LLL)
Page 30: Attacks on RSA using Lattice reduction techniques (LLL)
Page 31: Attacks on RSA using Lattice reduction techniques (LLL)
Page 32: Attacks on RSA using Lattice reduction techniques (LLL)
Page 33: Attacks on RSA using Lattice reduction techniques (LLL)
Page 34: Attacks on RSA using Lattice reduction techniques (LLL)
Page 35: Attacks on RSA using Lattice reduction techniques (LLL)
Page 36: Attacks on RSA using Lattice reduction techniques (LLL)

COPPERSMITH

Page 37: Attacks on RSA using Lattice reduction techniques (LLL)

BONEH-DURFEE

Page 38: Attacks on RSA using Lattice reduction techniques (LLL)
Page 39: Attacks on RSA using Lattice reduction techniques (LLL)
Page 40: Attacks on RSA using Lattice reduction techniques (LLL)
Page 41: Attacks on RSA using Lattice reduction techniques (LLL)
Page 42: Attacks on RSA using Lattice reduction techniques (LLL)
Page 43: Attacks on RSA using Lattice reduction techniques (LLL)
Page 44: Attacks on RSA using Lattice reduction techniques (LLL)
Page 45: Attacks on RSA using Lattice reduction techniques (LLL)

HOWGRAVE-GRAHAM

Page 46: Attacks on RSA using Lattice reduction techniques (LLL)
Page 47: Attacks on RSA using Lattice reduction techniques (LLL)
Page 48: Attacks on RSA using Lattice reduction techniques (LLL)
Page 49: Attacks on RSA using Lattice reduction techniques (LLL)
Page 50: Attacks on RSA using Lattice reduction techniques (LLL)

HERRMAN AND MAY: UNRAVELLED LINEARIZATION

Page 51: Attacks on RSA using Lattice reduction techniques (LLL)
Page 52: Attacks on RSA using Lattice reduction techniques (LLL)
Page 53: Attacks on RSA using Lattice reduction techniques (LLL)

BONEH-DURFEE BOUND

Page 54: Attacks on RSA using Lattice reduction techniques (LLL)

CONCLUSIONS

Page 55: Attacks on RSA using Lattice reduction techniques (LLL)
Page 56: Attacks on RSA using Lattice reduction techniques (LLL)
Page 57: Attacks on RSA using Lattice reduction techniques (LLL)
Page 58: Attacks on RSA using Lattice reduction techniques (LLL)