9.3 Pitfalls of RSA
1) Small Moduli
a)
We first factorize into and We know and has a modular inverse if and only if Using Corollary 4.5, there exist such that using the fact that , we get
b)
We first calculate We the calculate We now solve the equation system (using CRT) We get
2) Modulus shared between multiple users
Case 1: and are coprime to , We know using corollary 4.5 we get where Eve can efficiently compute such using the extended Euclidean algorithm. We know: , Therefore,
There are two sub cases:
- If : just compute using
- If at least one of is negative:
- Assume without loss of generosity that is negative, we write
- Since , we can write it as using corollary 4.5, where
- Again we can calculate using extended Euclidean algorithm
- we get by and calculate using
Case 2: At least one of is not co-prime to n Assume without loss of generosity that Let where
- :
- then
- :
- we know where are prime numbers and
- Let , , we can then easily compute
- Once we have , we can then compute using the extended Euclidean algorithm.
- Now we have the decryption key, we can compute using