2. Public Key Cryptography - Academic Science,International

advertisement
CRYPTANALYSIS ON RSA
Mrinalini, Bhoomika Luthra, Anupriya Dixit
Student, Department Of CSE
RKGITW, Ghaziabad
Student, Department Of CSE
RKGITW, Ghaziabad
Student, Department Of CSE
RKGITW, Ghaziabad
msaini727@gmail.com
luthrabhoomika@gmail.com
anupriyadixit252@gmail.com
Priyanka Mehta
Assistant Professor,Department Of CSE
RKGITW ,Ghaziabad
priyankamehta@rkgitw.edu.in
Abstract— The most widely developed public –
key cryptography system is the RSA. Mainly the
RSA used in the e-commerce and e-mail and
also used for both encryption and digital
signature. In this paper, the main methods used
in attacks against the RSA cryptosystem. This
paper describe the algorithm, mathematical
function and attacks and also defines the
countermeasures that can be used to prevent
many of the attacks .It include also cryptanalysis
means related study of breaking ciphers. It
provides the secure transmission of the messages
in the network.
(CRT) used for RSA against fault attacks [2]. This
theorem mainly breaks the practical attack .The
RSA is used for encryption, digital signatures and
key establishment. In fact, RSA is usually
providing the security of digital data .The study of
the mathematical techniques related to the security
of transmission. Cryptography is an important tool
in today’s information security. For decades,
cryptographers have analyzed the security of
cryptosystems by treating them as mathematical
entities and analyzing the properties of the
underlying cryptographic algorithm [2].
Type of the cryptography:
Keywords—RSA, Encryption, Decryption, Plain
text, Cipher test, Keys.
I.
INTRODUCTION
Cryptanalysis is the art and science of
analyzing information systems in order to study the
hidden aspects of the systems [1]. Cryptanalysis is
used to break cryptographic security systems and
gain access to the contents of encrypted messages.
Cryptanalysis is the complementary of the
Cryptography .Cryptography is the combination of
two words crypto + graphy crypto means secret
graphy means writing means secret writing.
Cryptography and RSA algorithms used for the key
generation. Protect Chinese remainder theorem
There are the two type of cryptography.
1. Symmetric – Key Cryptography
2. Public Key Cryptography
1. Symmetric – Key Cryptography- If users want to
securely communicate with each other, they must
share a key, which is used to both encrypt and
decrypt messages. Symmetric-key schemes are
usually fast. Key establishment is one of the main
problems. When considering a network of user
wishing to communicate securely, each pair of
user must share a secret key, which makes it
impractical for any medium-size network.
2. Public Key Cryptography-Each user has a key
pair (e, d), which consist of a public key e and a
private key d [4]. User A can make e publicly
available and keep d only secret any one can
encrypt information with e while only user A
decrypt it with d.
II.
7. Decryption- It is the processes in which cipher
text convert in to the plain text using the private
keyor Method of obtaining the encrypted message
back to its original form.
Plain Text
CRYPTOGRAPHY TERMINOLOGY
Cipher Text
1. Plaintext- The format of the data before being
encrypted. For example user A send the message
HELLO to the user B.HELLO is the actual form of
the data.
2. Cipher Text- The “scrambled” form of data after
being encrypted. For example if we add three in
each alphabet then makes the scrambled form is
KHOOR this is the scrambled form of the data.
3. Key- A secret value used during the encryption
and decryption process. There are two types of the
key


Encrypt
Key
Cipher Text
Decrypt
Plain Text
Public key
Private key
III.
HELLO WORLD
HELLO WORLD
#%GIUGRWTMN, S (?
RSA (RIVEST, SHAMIR, ADLEMAN)
They are the three inventors which develop the
RSA algorithm. RSA is most widely deployed
public key cryptosystem and is used for both
encryption and digital signature. It is implemented
in most web server and browsers and present in
most commercially available security product [4].
RSA ALGORITHM

Let p and q be two large prime numbers

Let n= p q be the modulus

Findф(n)=(p-1).(q-1)

Choose e such that it is relatively prime to
ф (n).

Choose d such that: e x d modф(n)=1

Public key is(n, e)

Private key is (d , n)
5. Private Key-private key is used when receiver
receive the message from the sender

To encrypt message M compute

C=M e mod N
6. Encryption- It is the processes in which plain
text convert in to the unreadable form using the
public key or Method of obtaining the original
message transfer in to its encrypted form.

To decrypt C compute

M=C d mod
ENCRYPTION
Key
DECRYTION
(Secret shared key)
Key
4. Public Key-public key is used when sender send
the message to the receiver.
IV.
ATTACK
It is hard to break the system but generally some
conditions due to attacker can break the system
such as if



Attacker knows the value of the secret
key.
Attacker knows the format of the plain
text.
Attacker knows the format of the cipher
text
Types Of Attack
In this an attacker typically uses some additional
information leaked by the implementation of the
RSA function or exploit faults in the
implementation [4] Attacks are usually applied
against smart cards and security tokens One usually
tries to reduce the amount of information leaked to
make it irrelevant to the adversary
6. Low Private Exponent Attack- RSA decryption
and signing are very compute intensive operation,
if some low power devices may want to use a d
instead of a random one in order to improve
performance.
1. Key Attack- The principle of the cryptography is
that the security of any cryptographic system based
on the secrecy of the private key. An attack on the
RSA cryptosystem due to the entire private
exponent d. So the Private exponent is consisting of
the large number of bytes because Attacker cannot
find the value of the private exponent.
However an attack due to M. Wiener shows that the
choice of small d can lead to a total break of the
system [4].
2.Message Attacks-When two person communicate
to each other .If Attacker know the scrambled form
of the message then he send same encrypt
message.
These attacks are monitoring the token’s power
consumption based on the fact that the power
consumption varies significantly during different
steps of the cryptographic operations
3. Timing Attack- Timing attacks against RSA were
introduced by P. Kocher in 1995 [4]. Timing
attacks establish the relation between the private
key and the runtime cryptographic operation. RSA
private operation consists of a modular
exponentiation. Modular exponentiation used the
private key d as exponent. If the private key is n
bits long, this consists of a loop running through
the bits of d, with at most 2n modular
multiplications. In each step the data is squared,
with the execution of a modular multiplication [3].
An attacker can recover bits of d one at a time, if a
low public exponent is used.
An attacker can recover the secret information.
4.Adaptive Chosen Cipher Text Attacks-In
1998, Daniel Bleichenbacher described the first
practical adaptive chosen cipher text attack, against
RSA-encrypted messages using the padding
scheme (a padding scheme randomizes and adds
structure to an RSA-encrypted message, so it is
possible to determine whether a decrypted message
is valid). Due to flaws with the padding scheme,
Bleichenbacher was able to practical attack against.
5. Side-Channel Analysis Attacks-A side-channel
attack using branch prediction analysis (BPA) has
been described [5]. Many processors used a branch
predictor to determine whether a conditional
branch in the instruction flow of a program is likely
to be taken or not. Branch prediction analysis
attacks use a spy process to discover (statistically)
the private key when processed with these
processors.Also known as implementation attacks
7. Power Analysis- The new form of attack on
smart cards and cryptographic tokens called power
analysis
Two types of power analysis:
Simple power analysis attack-Work by directly
observing system power consumption
Differentially power analysis attack- are more
power full using statistical analysis and error
correction techniques to extract information co
related to private keys .
8. Fault Analysis- Attacks work by exploiting
errors on key depended cryptography operations
.These errors can be random, latent
There are number of fault analysis attacks against
public key and symmetric key cryptographic
devices
LIPTON introduce RSA private operation is a very
compute intensive operation
RSA use a technique CRT for the improvement in
the performance
V.
CHINESE REMAINDER THEOREM
Around A.D 100, the Chinese mathematician suntsi solved the problem of finding those integers x
that leave remainder 2 when divided by three,
remainder 3 when divided by 5and remainder 2
when divided by 7. One such solution is x=23; all
solutions are the form 23+105k for arbitrary
integers k.
The Chinese remainder theorem provides a
correspondence between systems of equations
module a set of pair wise relatively prime module.
• CRT Algorithm – Gauss -If x = a1 (mod m1) = a2
(Mod m2) = …= a (mod mn) where m1, m2, mn
are relatively prime to each other.
• CRT Algorithm – Gauss where (modulo inverses
can be found using Extended Euclidean
Mi=∏𝒏𝒌=𝟏 𝒎k/mi
(Modulo inverses can be found using Extended
Euclidean Algorithm).
VII.
CONCLUSIONS
RSA cryptosystem is implemented in the most
popular security products and protocols used today
and can be seen as one of the basis for secure
communication in the internet
No devastating attack has ever been found and
most problem appear to be result of misuse of the
system, bad choice of parameters or flaws in
implementations
Years of research have probably increased the trust
the security community has on RSA
We have every reason to believe that it will remain
the most used public key algorithm for year to
come.
VIII.
REFRENCES
[1]Cryptanalysis\signalsanalysisNsa.gov.20090115 retrieves 2013-04-15.
[2]R. Anderson, M. Kuhn, \Low cost attacks on
tamper.
VI.
PREVENTION
Cryptanalysis of RSA provided us some attacks,
and users and developers must be aware when
working with RSA. Special attentions are: key
size, properties of parameters (primes, exponents),
and encoding and implementation details.
1. Key Size – As a rule, RSA keys should be large
enough so Attacker cannot attack the system.
Number of factors can use. Current standards
require a minimum length of 1024 bits for RSA
keys. If the value of the keys is too short then it
must be not used because Attacker easily identity
the value of the key. Factorization method and is
typically used to derive lower bounds for RSA key
sizes.RSA key should be low ,many of the current
standard required a minimum length of1024 bits for
RSA keys
2. Strong prime- Apart from a minimal length some
cryptography standards also require that the prime
used for RSA have some special properties in
particular, that (p-1) needs to have a large prime
factor, called strong primes
3. Public exponent - E is usually chosen to be either
3 or 2^ (16) +1=65537 .We believe 65537 is more
secure and used
4. Private exponent-For the typical 1024 bit key the
private exponent should be at least 300 bits long
5.Encoding- RSA algorithm apply to messages
without any kind of preprocessing known as raw
RSA offers a very week level of security and
should never be used so the message should always
be encoded prior to encryption or signing.
[3]H. Bar-El, H. Choukri, D. Naccache, M.
Tunstall, C.Whelan, \The sorcerer's apprentice
guide to faultattacks," Workshop on Fault
Detection and Tolerance in Cryptography, June
2004.
[4]D. Bleichenbacher, B. Kaliski and J. Staddon.
Recent Results on PKCS #1: RSA Encryption
Standard.RSALaboratories’BulletinNo.7,June1998.
ftp://ftp.rsasecurity.com/pub/pdfs/bulletn7.pdf. D.
Boneh. Twenty Years of Attacks on the RSA
Cryptosystem.
Download