exercise

9.3 Pitfalls of RSA

1) Small Moduli

a)

We first factorize into and We know and has a modular inverse if and only if Using Corollary 4.5, there exist such that using the fact that , we get

b)

We first calculate We the calculate We now solve the equation system (using CRT) We get

2) Modulus shared between multiple users

Case 1: and are coprime to , We know using corollary 4.5 we get where Eve can efficiently compute such using the extended Euclidean algorithm. We know: , Therefore,

There are two sub cases:

  • If : just compute using
  • If at least one of is negative:
    • Assume without loss of generosity that is negative, we write
    • Since , we can write it as using corollary 4.5, where
    • Again we can calculate using extended Euclidean algorithm
    • we get by and calculate using

Case 2: At least one of is not co-prime to n Assume without loss of generosity that Let where

  • :
    • then
  • :
    • we know where are prime numbers and
    • Let , , we can then easily compute
    • Once we have , we can then compute using the extended Euclidean algorithm.
    • Now we have the decryption key, we can compute using