Are `Strong' Primes Needed for RSA? 1 Introduction

Are `Strong' Primes Needed for RSA? 1 Introduction

Are Strong Primes Needed for RSA Ronald L Rivest y Rob ert D Silverman November Abstract We review the arguments in favor of using socalled strong primes in the RSA publickey cryptosystem There are two typ es of such arguments those that say that strong primes are needed to protect against factoring attacks and those that say that strong primes are needed to protect against cycling attacks based on rep eated encryption We argue that contrary to common b elief it is unnecessary to use strong primes in the RSA cryptosystem That is by using strong primes one gains a negligible increase in security over what is obtained merely by using random primes of the same size There are two parts to this argument First the use of strong primes provides no additional protection against factoring attacks b ecause Lenstras metho d of factoring based on elliptic curves ECM circumvents any protection that mighthave been oered by using strong primes The metho ds that strong primes are intended to guard against as well as ECM are probabalistic in nature but ECM succeeds with higher probability For RSA key sizes b eing prop osed now the probabilityof success of these metho ds is very low Additionally the newer Number Field Sieve algorithm can factor RSA keys with virtual certainty in less time than these metho ds Second a simple grouptheoretic argument shows that cycling attacks are extremely unlikely to b e eective as long as the primes used are large Indeed even probabalistic factoring attacks will succeed much more quickly and with higher probability than cycling attacks Intro duction The RSA publickey cryptosystem has received widespread acceptance in the commercial marketplace in part b ecause it has received intense scrutiny by academic cryptographers The purp ose of this pap er is to extend this scrutiny by carefully examining the common recommendation that one should use strong primes when constructing keys for an RSA Supp orted by RSA Data Security Inc Address Lab oratory for Computer Science Massachusetts Institute of Technology Cambridge MA Email address rivesttheorylcsmitedu y Address RSA Lab oratories Crosby Dr Bedford MA Email address b obsrsacom cryptosystem We nd that for practical purp oses using large random primes oers security equivalent to that obtained by using strong primes Current requirements for strong primes do not make them any more secure than randomly chosen primes of the same size Indeed these requirements can lead a general audience to b elieve that if a prime is strong that it is secure and that if it isnt strong then it must be weak and hence insecure This simply is not true We b egin in Section with a general discussion of the notion of weak keys Section then provides a review of the essentials of the RSA publickey cryptosystem mostly as a means of establishing notation In Section we continue with a denition of a strong prime Actually we provide several denitions corresp onding to the various criteria that have been prop osed in the literature In order to assure ourselves that strong primes are a practical p ossibility we review two algorithms for nding strong primes in Section A quick survey of the history of the recommendation to use strong primes is given in Section Here the rst author confesses to having played a part in this history of this recommendation We see that the recommendations are based on two basic concerns a concern ab out the diculty of factoring and a concern ab out cycling attacks Section discusses the requirement for strong keys rather than just strong primes Certain factoring attacks can exploit the relationship b etween the two primes that makeup the key as opp osed to exploiting the structure of the individual primes The requirement for strong primes ignores these attacks completely We shall show that suitably large random primes guard against these attacks In Section we consider factoring attacks on the mo dulus We see that b efore it app eared sensible to recommend using strong primes as a protection against certain factoring attacks known as the p attacks Indeed key sizes being prop osed at that time were amenable to attackby these metho ds The development of Lenstras elliptic curve metho d of factoring in is seen however to remove the motivation for using strong primes as a protection against the p factoring attacks We shall present tables which give the probability of success for p and ECM attacks foragiven level of eort In Section we address the second concern cycling attacks Here we present a new theorem that shows that as long as the primes used are large the cycling attacks are unlikely to succeed Finally Section closes with some recommendations We assume that the reader is familiar with elementary numb er theorysuch as presented by Niven and Zuckerman LeVeque or Chapter of Cormen et al For surveys of factoring and numb ertheoretic algorithms see Bach Bressoud Buell Dixon Guy Knuth Lenstra and Lenstra Montgomery Pomerance and Riesel We assume that the reader is familiar with the elementary notions of cryptography encryption decryption keys etc as given for example in Davies and Price An understanding of cryptography is not essential except as motivation for this pap er For discussions of the relationship b etween number theory and cryptography see Kranakis Pomerance and Rivest Weak keys In this section we review the notion of a weak key and attempt to characterize this notion more formally When a cryptographer selects a cryptographic key he is creating an instance of a problem that his adversary would liketo solve Supp ose the key selected is k and that the set of all p ossible keys is denoted K The adversary would like to determine k from some available data messages encrypted with key k etc The adversary may employ either generalpurp ose or sp ecialpurp ose metho ds in his attempt to determine k Here we understand a generalpurp ose metho d as one that is always eective no matter what k was chosen An example of a generalpurp ose metho d is brute force search trying each p ossible k in turn until the correct one is found On the other hand a sp ecialpurp ose metho d is dened by the requirementthatk b e of a sp ecial form if k is not of this form then the metho d will completely fail to nd k For this attack metho d keys of the sp ecial form may b e considered as weak keys For example a particular attack metho d may only work against keys that terminate in zeros such keys would be weak keys for this attack metho d The notion of a weak key has app eared b efore in the literature Sp ecically the notion of a weak key has b een dened for DES the Data Encryption Standard Davies and Price Section discuss the characteristics of weak and semiweak DES keys and recommend that the DES user avoid using these keys in certain situations We give this merely as an example and do not pursue the issue of DES weak keys further in this pap er When an adversary utilizes a sp ecialpurp ose attack metho d he is taking a gamble He is b etting that the cryptographer has b een so careless or unlucky as to havechosen a weak key that is one vulnerable to his sp ecialpurp ose metho d If the cryptographer didnt cho ose a weak key then the adversary gains nothing by his use of a sp ecialpurp ose metho dthe eort will cost time and money and he would have been b etter o using a generalpurp ose metho d On the other hand the adversary maybelucky the cryptographer mayhavechosen aweak key and the adversary maybeabletond k using his sp ecialpurp ose metho d much more eciently than he would using a generalpurp ose metho d When is it worthwhile for the adversary to take such a gamble To answer this question we adopt the following gure of merit for an attack metho d the expected amount of eort required for the adversary to nd his rst solution Such measures have app eared in the literature b efore for example see Lubys monograph Luby calls the measure the timesuccess ratio and denes it as the ratio of the running time of the sp ecialpurp ose metho d to its probability of success We imagine that the adversary is given a sequence of problem instances to solve each corresp onding to a dierent cryptographic key where the keys havebeenchosen indep endently according to the standard keygeneration pro cedure for the cryptosystem The attacker applies his sp ecialpurp ose metho d to each instance in turn His metho d mayfailtosolvemany of the instances those instances not based on weak keys He keeps trying new instances until he has his rst success The exp ected total amount of eort he has exp ended up until his rst success is the desired gure of merit We call this measure the timetorstsolution We can make this notion more precise as follows Let S denote the sp ecialpurp ose metho d under consideration and let K a subset of K denote the set of weak keys for S which S is able to nd a solution Let p denote the probability that the cryptographer S has chosen a weak key For example this probability is jK j jK j if the keys are chosen S uniformly at random from K p may be larger or smaller than jK j jK j if the standard S S keygeneration algorithm generates keys nonuniformly The exp ected number of instances the adversary has to consider b efore he solves one is p Supp ose that metho d S runs for time t when it succeeds and for time t when it S S S fails Then the exp ected value of S s timetorstsolution is T S p t p t T S S S S S t t S S p S The timetorstsolution is a robust notion that can be applied to generalpurp ose metho ds as well as sp ecialpurp ose

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    23 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us