Ask your own question, for FREE!
Mathematics 14 Online
OpenStudy (anonymous):

Is there a way(cryptanalysis) to break the RSA algorithm?

OpenStudy (kinggeorge):

There is in fact one way I've come across in which one can get individual messages without breaking the cryptosystem. In terms of actually breaking it and getting the key, I have not heard of any ways other than factoring \(N\).

OpenStudy (kinggeorge):

There are a few different ways to factor \(N\), such as straight factoring, finding \(\phi(N)\), or finding \(p+q\) (where \(pq=N\)). All of these will allow you to factor \(N\).

OpenStudy (kinggeorge):

If you're interested in seeing the way obtain an individual message, let me know. As fair warning, it is somewhat mathematically intense.

OpenStudy (anonymous):

The only way I've heard was just to factor N and then taking the result and subtracting 1 from each to find ϕ(N) and then just using that to find the key. The other way I found was by using the lattice method, but I don't really understand most of it, so I skipped it. What's your way called?

OpenStudy (kinggeorge):

I don't know if it has a name or not. Like I said previously, I do not believe the method I am mentioning actually cracks the system.

OpenStudy (anonymous):

You could try explaining it to me and see if I understand it ^^

OpenStudy (kinggeorge):

As far as I can tell, it's a form of chosen-ciphertext attack. For the real simple explanation of what it is, look at the fourth bullet point here: http://en.wikipedia.org/wiki/RSA_(algorithm)#Attacks_against_plain_RSA

OpenStudy (kinggeorge):

Here's the full explanation that I have. Suppose Alice is sending a message to Bob, and Eve wants to read it. Alice sends \(c\equiv m^e \pmod{N}\) to Bob. Eve intercepts this. Now, Eve chooses \(k\) such that \(\gcd(k, N)=1\). Using this, Eve encrypts \(c'\equiv k^e\cdot c\pmod{N}\) and sends this to Bob, asking Bob to decrypt it to make sure everything is working just fine. Bob decrypts \(c'\) getting\[m'\equiv (c')^d\equiv(k^e\cdot m^e)^d\pmod{N}\]Simplifying this, \[m'\equiv (k^{ed}\cdot m^{ed})\equiv k\cdot m\pmod{N}\]Now Bob sends this back to Eve. Recall that Eve knows, \(k\), and can quickly find \(k^{-1}\pmod{N}\). Finally, Eve multiplies \[k^{-1}\cdot m'\equiv k{-1}\cdot k\cdot m\equiv m\pmod{N}\]Obtaining the original message.

OpenStudy (anonymous):

That's intense.

OpenStudy (kinggeorge):

Once you take the explanation apart and look at each piece, it's not too bad.

OpenStudy (anonymous):

But to do this, you'd have to interact with the owner of the private key.

OpenStudy (kinggeorge):

Correct. You would be acting under the guise of someone that wants to exchange messages, and is testing the key holder's encryption.

OpenStudy (anonymous):

Have you tried this? xD

OpenStudy (kinggeorge):

I've done one or two small examples by hand. This is just something we were taught in my cryptography course.

Can't find your answer? Make a FREE account and ask your own questions, OR help others and earn volunteer hours!

Join our real-time social learning platform and learn together with your friends!
Can't find your answer? Make a FREE account and ask your own questions, OR help others and earn volunteer hours!

Join our real-time social learning platform and learn together with your friends!