Wednesday, October 16, 2013

Section 6.2, due Wed Oct 16

This section deals with attacks on RSA. The author outlines some attacks.
  • Knowing a particular fraction of the digits of a one of the primes  or q of  will allow you to factor n completely.
  • Low exponent attacks--when d, the decryption exponent, is suffuciently small (< 1/3 * n^(1/4)) allows Eve to use the continued fraction approximations of e/n and calculate the factors of n.
  • Short plaintext: split the bits up, and do a meet-in-the-middle-esque attack.
  • Timing attacks - using knowledge of the hardware/software implementation of RSA (especially the fast modular exponentiation part), and precise timings of instances of Bob decrypting messages, Eve may find Bob's decryption exponential power.
My response:
  1. The OAEP was the hardest part (in 6.2.2). I just glossed over it because it seems overly specific and an implementation detail I don't really care about. 
  2. I actually quite enjoyed the proof in 6.2.1 using our result about the continued fractions from 3.12. Is there a reason they use 1/3 instead of 1/2?

No comments:

Post a Comment