A Continued Fraction-Hyperbola based Attack on RSA cryptosystem

AI-generated keywords: RSA Cryptanalysis Continued Fractions Hyperbolas Attack Modulus

AI-generated Key Points

  • The paper is titled "A Continued Fraction-Hyperbola based Attack on RSA Cryptosystem"
  • The authors are Gilda Rech Bansimba, Regis Freguin Babindamana, and Basile Guy R. Bossoto
  • They present new arithmetical and algebraic results following the work of Babindamana et al. on hyperbolas
  • Their approach to attacking an RSA-type modulus based on continued fractions is independent and not bounded by the size of the private key d nor public exponent e compared to Wiener's attack
  • The authors' primary goal in this attack is to find a point Xα=(-α3, α3+1)∈Z2∗ that satisfies ⟨Xα3,P3⟩=0 from a convergent of αi4/αj4+δ
  • P3∈Bn(x,y)∣x≥4n
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Gilda Rech Bansimba, Regis Freguin Babindamana, Basile Guy R. Bossoto

License: CC BY 4.0

Abstract: In this paper we present new arithmetical and algebraic results following the work of Babindamana and al. on hyperbolas and describe from the new results an approach to attacking a RSA-type modulus based on continued fractions, independent and not bounded by the size of the private key $d$ nor public exponent $e$ compared to Wiener's attack. When successful, this attack is bounded by $\displaystyle\mathcal{O}\left( b\log{\alpha_{j4}}\log{(\alpha_{i3}+\alpha_{j3})}\right)$ with $b=10^{y}$, $\alpha_{i3}+\alpha_{j3}$ a non trivial factor of $n$ and $\alpha_{j4}$ such that $(n+1)/(n-1)=\alpha_{i4}/\alpha_{j4}$. The primary goal of this attack is to find a point $\displaystyle X_{\alpha}=\left(-\alpha_{3}, \ \alpha_{3}+1 \right) \in \mathbb{Z}^{2}_{\star}$ that satisfies $\displaystyle\left\langle X_{\alpha_{3}}, \ P_{3} \right\rangle =0$ from a convergent of $\displaystyle\frac{\alpha_{i4}}{\alpha_{j4}}+\delta$, with $P_{3}\in \mathcal{B}_{n}(x, y)_{\mid_{x\geq 4n}}$. We finally present some experimental examples. We believe these results constitute a new direction in RSA Cryptanalysis using continued fractions.

Submitted to arXiv on 08 Apr. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2304.03957v1

In their paper, "A Continued Fraction-Hyperbola based Attack on RSA Cryptosystem," Gilda Rech Bansimba, Regis Freguin Babindamana, and Basile Guy R. Bossoto present new arithmetical and algebraic results following the work of Babindamana et al. on hyperbolas. They describe an approach to attacking an RSA-type modulus based on continued fractions that is independent and not bounded by the size of the private key $d$ nor public exponent $e$ compared to Wiener's attack. The authors' primary goal in this attack is to find a point $\displaystyle X_{\alpha}=\left(-\alpha_{3}, \ \alpha_{3}+1 \right) \in \mathbb{Z}^{2}_{\star}$ that satisfies $\displaystyle\left\langle X_{\alpha_{3}}, \ P_{3} \right\rangle =0$ from a convergent of $\displaystyle\frac{\alpha_{i4}}{\alpha_{j4}}+\delta$, with $P_{3}\in \mathcal{B}_{n}(x, y)_{\mid_{x\geq 4n}}$.
Created on 12 Apr. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.