Skip to main content

Lattice Attacks on RSA-Encrypted IP and TCP

  • Conference paper
  • First Online:
Cryptography and Coding (Cryptography and Coding 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2260))

Included in the following conference series:

  • 823 Accesses

Abstract

We introduce a hypothetical situation in which low-exponent RSA is used to encrypt IP packets, TCP segments, or TCP segments carried in IP packets. In this scenario, we explore how the Coppersmith/ Howgrave-Graham method can be used, in conjunction with the TCP and IP protocols, to decrypt specific packets when they get retransmitted (due to a denial-of-service attack on the receiver’s side). We drawconclusions on the applicability of the Coppersmith/Howgrave- Graham method, its interaction with “guessing”, and the difficulties of building a secure system by combining well-known building blocks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellovin, S., Defending Against Sequence Number Attacks. Internet RFC 1948, May 1996.

    Google Scholar 

  2. Boneh, D., Twenty Years of Attacks on the RSA Cryptosystem. Notices of the AMS 46 (1998) pp. 203–213. http://www.crypto.stanford.edu/~dabo/papers/RSA.ps

    MathSciNet  Google Scholar 

  3. Braden, R. (Ed.), Requirements for Internet Hosts — Communication Layers. Internet RFC 1122, October 1989.

    Google Scholar 

  4. Coppersmith, D., Small solutions to polynomial equations, and lowexp onent RSA vulnerabilities. J. Cryptology 10 (1997) pp. 233–260.

    Article  MATH  MathSciNet  Google Scholar 

  5. Crouch, P.A., A small public exponent RSA attack on TCP/IP packets. Project, University of Bath Department of Mathematical Sciences, May 2001. http://www.p-crouch.com/rsa-tcpip.

  6. Davenport, J.H., Lecture notes at LMS Durham Symposium. http://www.bath.ac.uk/~masjhd/Durham.dvi,ps,pdf

  7. Howgrave-Graham, N.A., Finding Small Roots of Univariate Modular Equations Revisited. Cryptography and Coding (Ed. M. Darnell), Springer Lecture Notes in Computer Science 1355, 1997, pp. 131–142.

    Chapter  Google Scholar 

  8. Howgrave-Graham, N.A., Computational Mathematics inspired by RSA. Ph.D. Thesis, University of Bath, 1998.

    Google Scholar 

  9. Lenstra, A. Lenstra, H. Lovász. Factoring Polynomials with Rational Coefficients. Mathematische Annalen 261 (1982) pp. 515–534. Zbl. 488.12001. MR 84a:12002.

    Article  MATH  MathSciNet  Google Scholar 

  10. Morris, R.T., A Weakness in the 4.2BSD Unix TCP/IP Software. Computing Science Technical Report 117, AT&T Bell Laboratories, Murray Hill, NewJersey, 1985.

    Google Scholar 

  11. Nguyen, S. and Stern, J., Lattice Reduction in Cryptography: An update. Proc. ANTS-IV (ed. W. Bosma), Springer Lecture Notes in Computer Science 1838, Springer-Verlag, 2000, pp. 85–112. Updated at http://www.di.ens.fr/~pnguyen/pub.

    Google Scholar 

  12. Shoup, V. NTL (Number Theory Library) for C++. http://www.shoup.net.

  13. Stevens, W.R., TCP/IP Illustrated, Volume 1. Addison Wesley, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Crouch, P.A., Davenport, J.H. (2001). Lattice Attacks on RSA-Encrypted IP and TCP. In: Honary, B. (eds) Cryptography and Coding. Cryptography and Coding 2001. Lecture Notes in Computer Science, vol 2260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45325-3_29

Download citation

  • DOI: https://doi.org/10.1007/3-540-45325-3_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43026-1

  • Online ISBN: 978-3-540-45325-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics