From: Mok-Kong Shen on
Mok-Kong Shen:
> Mok-Kong Shen wrote:
>
>> Here is a second trial, though offhand I can't know how practical it is:
> [snip]
>
> Apology, my big mistake: lcm(p-1,q-1) is unknown. But there might be
> certain non-negligible chance of employing the factors of ed-1 that
> way, I guess.

I mean:

ed - 1 = k * lcm(p-1,q-1)

phi(n) <= lcm(p-1,q-1)^2 <= (ed - 1)^2

All prime factors of phi(n) are also in lcm(p-1,q-1) and hence form
a subset of those of ed-1. Thus, if ed-1 is not hard to factor, one
can solve for p and q, since the number of candidates of phi(n) is
finite.

M. K. Shen

From: amzoti on
On Jan 30, 9:56 am, unruh <un...(a)wormhole.physics.ubc.ca> wrote:
> On 2010-01-30, Rainer Urian <rai...(a)urian.eu> wrote:
>
> > I know that this is doesn't matter for RSA based cryptographic operations.
> > But it makes a difference if  one will calculate CRT parameters from  n,e
> > and d
>
> Cathode Ray Tube?
>


http://acronyms.thefreedictionary.com/CRT

However, I think it is a safe bet to go with this one:
http://mathworld.wolfram.com/ChineseRemainderTheorem.html

;-)
From: Rainer Urian on
the problem is that you cannot know if ed-1 is simple to factor.For
instance, if p,q are Germain primes (i.e. p'= (p-1)/2 is also prime) then
you cannot factor 2*p'*q'. You also cannot know that lcm and phi differ only
by a factor of 2.
On the other hand, before using an algorithm which needs factoring, it is
far more preferable to use a fast probabilistic algorithm.

Rainer



"Mok-Kong Shen" <mok-kong.shen(a)t-online.de> schrieb im Newsbeitrag
news:hk8qnn$poj$00$1(a)news.t-online.com...
> Mok-Kong Shen:
>> Mok-Kong Shen wrote:
>>
>>> Here is a second trial, though offhand I can't know how practical it is:
>> [snip]
>>
>> Apology, my big mistake: lcm(p-1,q-1) is unknown. But there might be
>> certain non-negligible chance of employing the factors of ed-1 that
>> way, I guess.
>
> I mean:
>
> ed - 1 = k * lcm(p-1,q-1)
>
> phi(n) <= lcm(p-1,q-1)^2 <= (ed - 1)^2
>
> All prime factors of phi(n) are also in lcm(p-1,q-1) and hence form
> a subset of those of ed-1. Thus, if ed-1 is not hard to factor, one
> can solve for p and q, since the number of candidates of phi(n) is
> finite.
>
> M. K. Shen
>

From: Francois Grieu on
Rainer Urian wrote:

> I am wondering if there are two different definitions of RSA keys.
>
> One definition states that one should calculate the secret exponent d as
> (1) e*d = 1 mod phi(n) (= (p-1)*(q-1))
>
> The other states that
> (2) e*d = 1 mod lcm(p-1,q-1)
>
> Both definitions lead to different d values

[nitpicks: these are requirement for d, not definitions of d,
much less of RSA]

A most usual definition of d, that in PKCS#1, is

The RSA private exponent d is a positive integer less
than n satisfying (2).

This leaves the choice open for at least two distinct d. It is very
common that the smallest d is chosen, and that it does not verify (1).
Therefore assuming (1) is bad.

ANSI X9.31 asks for (2) and puts a lower bound on d, which can only
be meaningfully interpreted as requiring that d is less than
lcm(p-1,q-1), and similarly (1) can't be assumed.

Actually I fail to locate of any specification which requires (1).


Francois Grieu
From: Mok-Kong Shen on
Rainer Urian wrote:
> the problem is that you cannot know if ed-1 is simple to factor.For
> instance, if p,q are Germain primes (i.e. p'= (p-1)/2 is also prime) then
> you cannot factor 2*p'*q'. You also cannot know that lcm and phi differ
> only by a factor of 2.
> On the other hand, before using an algorithm which needs factoring, it
> is far more preferable to use a fast probabilistic algorithm.

But a fast probabilistic algorithm on what (not to factor something?) ?

Thanks,

M. K. Shen

First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5
Prev: Method and Logic
Next: Frustration with mathematics