Abstract
The security of some cryptosystems is based on the difficulty of solving a quadratic modular equation. This paper shows a new algorithm for finding the small root of the quadratic modular equation. While previous algorithms for finding the small root of the modular equation are based on the LLL algorithm, the new algorithm is based on the continued fraction. Using the new algorithm, we can find the root less than n 1/4, where n is the modulus. The new algorithm is more efficient than previous algorithms even if the modulus is large.
Preview
Unable to display preview. Download preview PDF.
References
Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics Springer-Verlag 138 (1993)
Coppersmith, D.: Finding a small root of a univariate modular equation. Lecture Notes in Computer Science Advances in Cryptology — EUROCRYPT'96 1070 (1996) 155–165
Kurosawa, K., Ito, T., and Takeuchi, M.: A public key cryptosystem using a reciprocal with the same intractability as factoring a large number. IEICE Transactions J70-A 11 (1987) 1632–1636
Lenstra, A. K., Lenstra, H. W., and Lovász, L.: Factoring polynomials with rational coefficients. Mathematische Annalen 261 (1982) 515–534
Rabin, M. O.: Digital signatures and public-key functions as intractable as factorization. MIT Laboratory for Computer Science MIT/LCS/TR-212 (1979)
Rivest, R. L., Shamir, A., and Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) 120–126
Vallée, B., Girault, M., and Toffin, P.: How to guess l-th roots modulo n by reducing lattice bases. Lecture Note in Computer Science 357 (1988) 427–442
Wiener, M. J.: Cryptanalysis of short RSA secret exponents. IEEE Transaction on Information Theory 36 3 (1990) 553–558
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kuwakado, H., Tanaka, H. (1998). Fast algorithm for finding a small root of a quadratic modular equation. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030410
Download citation
DOI: https://doi.org/10.1007/BFb0030410
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64382-1
Online ISBN: 978-3-540-69767-1
eBook Packages: Springer Book Archive