1. Introduction
Invented in 1978 by Rivest, Shamir, and Adleman [1], the RSA cryptosystem is one of the most used public key cryptosytems regarding its practical applications. Its security is related to the hardness of factoring composite large integers. To use the RSA scheme, one starts by generating two large prime numbers p and q of the same bit size, and it computes as the RSA modulus. Then, one selects an integer e, called the public exponent, satisfying . This enables us to compute the private exponent d as the inverse of e modulo , that is . The encryption process allows transforming a plaintext to a ciphertext . To recover the plaintext m, one applies the decryption process . The efficiency of both encryption and decryption is based on the run time of the modular exponentiation. To reduce the run time, specifically in the decryption, it is tempting to use small private exponents. Unfortunately, in 1990, Wiener [2] showed that such a choice is vulnerable when . The former bound was improved later by Boneh and Durfee [3] up to .
Based on these obstacles, several variants have been proposed to improve the efficiency as well as the security of RSA. Some of these variants employ a modulus of the form as in CRT-RSA [4], rebalanced RSA [2], and KMOV [5]. In contrast, other variants utilize different types of moduli, such as Multi-Prime RSA [6] and Prime-Power RSA [7].
In 2018, Murru and Saettone [8] introduced a new variant of the RSA scheme based on the cubic Pell equation , where a is a cubic non-residue modulo . They used as a modulus, with the public key being and the private key , where e and d satisfy . This variant of RSA has been intensively cryptanalyzed in [9,10,11,12].
In 2022, Cotan and Teşeleanu [13] proposed a generalization of the scheme of Murru and Saettone. They used a modulus , a public exponent e, and a private exponent d such that for . The special case is the scheme of Murru and Saettone. The authors also presented an attack based on the continued fraction algorithm whenever , , , , and .
In 2024, Nitaj et al. [14] developed a novel attack on the Cotan and Teşeleanu scheme using Coppersmith’s method and lattice basis reduction. They demonstrated that one can efficiently factor the modulus if , , , and .
In the work of Nitaj et al. [14], the authors started by solving the modular equation where is a monic polynomial of degree r, under certain conditions, namely, , , , , and . As a by-product, they presented an attack on the scheme of Cotan and Teşeleanu and showed that can be factored for any if e and d satisfy and . This significantly improved the bound of Cotan and Teşeleanu.
In this paper, for a monic univariate polynomial of degree r, we propose a new lattice-based method to solve the equation when , , , , , and . This can be achieved for any value of c; in particular, the condition is no more required. This allows us to perform four attacks on the scheme of Cotan and Teşeleanu. The first attack deals with the situation where the least significant bits (LSBs) of the private exponent d are known. The second attack concerns the situation where an approximation of one of the primes is known. The third attack concerns the situation when the primes share their most significant bits (MSBs). The fourth attack concerns the situation where the primes share their least significant bits.
The paper is organized as follows. In Section 2, we present some preliminaries and provide a new expression for that is useful in the sequel. In Section 3, we present the new method to find the small solutions of the equation . In Section 4, we apply the proposed method to perform the first attack on the cryptosystem of Cotan and Teşeleanu, namely, an attack with known LSBs. In Section 5, we present the second attack, which is a partial prime exposure attack. In Section 6, we apply the third attack when the prime factors of the modulus share their MSBs. In Section 7, we present another expression for which allows performing the fourth attack when the prime factors of the modulus share their LSBs. Finally, we conclude the paper in Section 8.
2. Preliminaries
Let be an RSA modulus with . Then, p and q can be bounded in terms of N as in the following simple lemma.
Let be an RSA modulus with . Then,
The following lemma shows how to find an approximation of q if an approximation of p is given (see [9]).
Let be an RSA modulus with . Let be an approximation of p such that . Then, is an approximation of q such that
The generalized totient function in the system of Cotan and Teşeleanu [13] is defined for and by
The following result gives simple upper and lower bounds for .
Let , , and . Then
For the lower bound, we have
For the upper bound, using for , we obtain This terminates the proof. □The following result shows how to compute (see [14]).
Let and . Then, , , and for ,
The following result shows that can be expressed as a polynomial of (see [14]).
Let and . Then, there exist integer coefficients depending only on N and n such that
Note that in Lemma 5, the coefficients can be computed only by using N and n. Nevertheless, cannot be computed by an adversary who does not know .
The former result can be extended in the following form.
Let , , , and . Then, there exist coefficients , , depending only on N, n, and M such that
We proceed by recursion. We have , and
Assume that, for , we have Using Lemma 4, we obtain where This shows that all the coefficients , are integers and depend only on N, n, and M. This terminates the proof. □Using Lemma 4, one can express the first values of as a polynomial in . For instance, we have
2.1. Lattice Basis Reduction and Coppersmith’s Method
Let and n be positive integers with . Let be linearly independent vectors of . A lattice is the set of all integer linear combinations of , that is,
The lattice can be represented by a matrix B whose rows are the vectors . The parameter n is the dimension of the lattice , and is its rank. Its determinant is defined to be where is the transpose of B. When , we say that the lattice is full-rank, and then its determinant is simplified to .It is known that a lattice has infinitely many bases, and finding a basis with short vectors is a hard task especially when the dimension of the lattice is large. In 1982, Lenstra, Lenstra and Lovász [15] proposed LLL, which is a polynomial time algorithm to find a short basis. The following result [16] is widely used to estimate the output of the LLL algorithm.
Let be a lattice spanned by a basis . The LLL algorithm produces a reduced basis satisfying
2.2. Coppersmith’s Method
In 1996, Coppersmith [17] proposed an efficient way to find small roots of modular polynomial equations of the form , mainly when the factorization of the modulus M is unknown. Since then, Coppersmith’s method has been generalized to polynomials with more variables, specifically polynomials of the form
with . For such polynomials, the Euclidean norm is defined by .In 1997, Howgrave-Graham [18] clarified Coppersmith’s method in the following sense.
(Howgrave-Graham). Let be a multivariate polynomial with at most ω monomials. Let e and m be positive integers. Suppose that
- 1.
.
- 2.
, , for .
Then, holds over the integers.
When more than two variables are involved, the methods based on Coppersmith’s technique are heuristic. In this paper, we use the following assumption [3,12,19,20]. This is a reasonable assumption that holds true when the parameters are sufficiently smaller than the theoretical bounds.
The reduced polynomials generated by the LLL algorithm are algebraically independent.
Under the former assumption, the common root of the polynomial equations , can be extracted by the Gröbner basis method or resultant techniques.
2.3. The Scheme of Cotan and Teşeleanu
Before describing the scheme, we need to define some mathematical objects that are useful in the sequel. Let be a field. Let n be an integer and such that is irreducible in . Define the quotient field
The product of two elements and of can be computed by the rule Consider the quotient group ; then, elements of are equivalence classes of the form Note that , where and whenever .When p is a prime number and is the finite field of p elements, becomes the Galois field of order . Also, is a cyclic group of order
If m is a positive integer and , denote by the product of y in , times. Hence, an analogous of Fermat’s little theorem is given byObserve that if is the product of two prime numbers, and , we obtain
Furthermore, for every , we also have The scheme of Cotan and Teşeleanu can be summarized as follows.Key Generation
-
1.. Select a positive integer and a security size .
-
2.. Generate randomly two distinct large prime numbers of size .
-
3.. Calculate and .
-
4.. Choose an integer a for which is irreducible in , , and .
-
5.. Select an integer e such that and compute d, the inverse of e modulo .
-
6.. The public key is and the private key is .
Encryption
-
1.. Represent the plaintext as a polynomial
-
2.. Compute .
-
3.. The ciphertext is .
Decryption
To recover the plaintext , one needs to compute
3. Solving the Equation
In this section, we propose a new technique to find the small solutions of the modular equation where c is a constant, and is a monic polynomial of degree r. The equation was previously studied by Kunihiro [21] and recently by Nitaj et al. [14]. In both works, the value is replaced by , and the assumption is used. In this paper, we present a different method where is independent of c. This relaxes the condition used in [14,21], and it permits more applications in the cryptanalysis of some variants of RSA.
3.1. The New Method
Let be an RSA modulus with . Let be a monic polynomial of degree . If with , , , , and
then one can find x and y in polynomial time.
Let with . We use Coppersmith’s technique [17] and the strategy of Jochemsz and May [19] to find the small solutions of the equation . Let m be a positive integer and t be a positive value. For , consider the set
A direct computation shows that the monomials of are composed by the couples with Also, the monomials of are composed by with This implies that the monomials of are composed by with or equivalently In the strategy of Jochemsz and May [19], we need to form the set . Since is composed by the monomials with then is the set of the monomials composed by As in the strategy of Jochemsz and May, consider the list of polynomials These polynomials reduce to Using , we set , and . Then, the polynomials can be transformed into the following ones, where each term is replaced by z.Let be a solution of the equation , and . Then, is a solution of the equation , and the polynomials satisfy .
Define the bounds
and assume that the solution satisfies , , . Following Coppersmith’s method, we use the coefficient vectors of the polynomials to form a matrix which is used as the basis matrix of a lattice . In this matrix, the rows are ordered so that if , or if and , or if , , and . Similarly, the monomials are ordered so that if , or if and , or if , , and . In Table 1, we present an example of the matrix of the lattice for , where the symbols ★ are non-zero entries.By construction, the matrix of the lattice is triangular, and its determinant is the product of the diagonal terms
(1)
To compute the former exponents, consider the function Set for . To ease the computations, we take . The dominant parts of the exponents , , , as well as of the dimension of the lattice satisfy(2)
After applying the LLL algorithm to the matrix of the lattice , we obtain a reduced matrix from which we can extract new polynomials . To combine Theorems 1 and 2 with , we set Using (1), this reduces to(3)
Using the dominant parts (2) with , , , and , we obtain, after neglecting some small terms Rearranging, we obtain(4)
in which the optimal value for is Since , then , and . Then, plugging in (4), we obtain which leads to We notice that the former bound is positive since . Under this bound, using three reduced polynomials , , , we can extract the solution by the Gröbner basis method or resultant computations. This terminates the proof. □3.2. A Numerical Example
In this section, we present a small numerical example to show the details of the resolution method of Theorem 3 with , and . Consider the following parameters
Then, with , and , so that with . Set . Then, the conditions of Theorem 3 are satisfied since , and . The goal is to find a small solution of the equation where is derived from with , that is Consider the bounds , , and with Let , , and The lattice is constructed with the coefficients of the polynomials defined by where each term is replaced by z. The dimension of the lattice is . After reducing the lattice with the LLL algorithm, and solving a system formed by three polynomial equations over the integers with the Gröbner basis method, we find the solution Using and , we obtain and the factorization of N is complete. Notice that , and c is much larger than . This shows that the methods described in [14,21] cannot be applied to solve the equation .4. Partial Key Attack on the Scheme of Cotan and Teşeleanu with Known LSBs
In this section, we apply Theorem 3 to attack the scheme of Cotan and Teşeleanu when the attacker knows the s least significant bits (LSBs) of d so that for , with known , and unknown .
Let , and be the product of two unknown prime factors with . Let , and such that with . Let M and be two known integers such that with . Then, one can factor N in polynomial time if
In the equation , assume that where M and are known, and is unknown. We assume the following bounds
We rewrite the equation as where by Lemma 5, with known coefficients , . Let , and consider the polynomial Then, satisfies . By Lemma 1, we have . Also, we have We can then apply Theorem 3 where is replaced by , is replaced by , , and . Then, the inequality in Theorem 3 leads to After finding the solutions of the equation , only one satisfies . Then, combining , and , this leads to the factorization of N and terminates the proof. □5. Cryptanalysis of the Scheme of Cotan and Teşeleanu with a Known Approximation of One of the Primes
In this section, we consider the scheme of Cotan and Teşeleanu with when , and an approximation of p is known.
Let , and be the product of two unknown prime factors with . Suppose that with , , and . Let be an approximation of p with . Then, one can factor N in polynomial time if
Suppose that with and . This implies that . Let be an approximation of p with . Then, by Lemma 2, the integer is an approximation of q such that and . Set . By Lemma 6, one has . Then, the equation can be rewritten as
Consider the polynomial with . Then, is a solution of the modular polynomial equation . Using , , , and since , we obtain Let and . Then, using , , and in Theorem 3, we obtain After finding the solutions of the equation , only one satisfies . Then, combining , and , this leads to the factorization of N and terminates the proof. □6. Cryptanalysis of the Scheme of Cotan and Teşeleanu with Primes Sharing MSBs
The following result is a direct application of Theorem 5. It concerns the case of a modulus where the prime difference is small.
Let and be the product of two unknown prime factors with and . Suppose that with , , and . Then, one can factor N in polynomial time if
Suppose that . Since, by Lemma 1, we have , one obtains
This implies that is an approximation of p such that . Then, using Theorem 5, one can factor if This terminates the proof. □7. Cryptanalysis of the Scheme of Cotan and Teşeleanu with Primes Sharing LSBs
In this section, we propose an attack on the scheme of Cotan and Teşeleanu when the prime factors share an amount of their least significant bits.
Let be an RSA modulus with . Suppose that p and q share their least significant bits so that for a known s and an unknown u. Then, the following result shows that one can find the s least significant bits of p and q and the least significant bits of (see [22,23]).
Let be an RSA modulus with . Suppose that with a known s and an unknown u. Let be a solution of the equation and
Then, , , and for some integers , , and v.
For , the following Lemma shows that can be expressed as a polynomial in v with integer coefficients.
Let , , , with . Then, there exist coefficients , , depending only on N, n, s, and such that
Since , then . Then, by Lemma 6, with , there exist integers , , such that
Then, where , . This terminates the proof. □The following result concerns the situation where the prime factors p and q share their least significant bits.
Let and be an RSA modulus with . Suppose that is odd and satisfies the equation with and . Suppose that p and q share their s least significant bits with . If
then one can factor N in polynomial time.
Assume that p and q share their least significant bits so that . Let be a solution of the equation and,
Then, by Lemma 7, we have , , and . The equation can be rewritten as , and by Lemma 8, we have Suppose that e is odd. Then, , and the equation can be rewritten as where is the inverse of modulo e. Consider the polynomial where , and . Then, is a solution of the equation . Theorem 3 can then be applied to find the small solutions. Assume that , , and . Then, using , we obtain Also, using , we obtain Observe that . Otherwise, one obtains , that is with . This leads to the factorization of N.Let , and . Then, applying Theorem 3 with , , and , we can find the solution if
Using and , we obtain . This leads to the factorization of N. □8. Conclusions
In this paper, we proposed a new technique to solve the modular equation for small unknown integers x, y, and for an arbitrary value of c where is a monic polynomial of degree . The methodology is based on Coppersmith’s method and lattice basis reduction. It finds the solutions in contrast to the former methods which fail when . As an application of our method, we present four attacks on the scheme of Cotan and Teşeleanu, namely a partial key exposure attack with known least significant bits, a partial prime exposure attack, and two attacks when the prime factors share their least or most significant bits.
Conceptualization, M.R. and A.N.; methodology, M.R. and A.N.; software, M.R. and A.N.; validation, M.R., A.N. and M.Z.; formal analysis, M.R. and A.N.; investigation, M.R. and A.N.; resources, M.R. and A.N.; data curation, M.R. and A.N.; writing—original draft preparation, M.R. and A.N.; writing—review and editing, M.R. and A.N.; visualization, M.R. and A.N.; supervision, M.R., A.N. and M.Z.; project administration, M.R., A.N. and M.Z. All authors have read and agreed to the published version of the manuscript.
Data are contained within the article.
The authors declare no conflicts of interest.
The following abbreviations are used in this manuscript:
RSA | Rivest, Shamir, Adleman |
KMOV | Koyama, Maurer, Okamoto, Vanstone |
CRT | Chinese Remainder Theorem |
MSBs | most significant bits |
LSBs | least significant bits |
LLL | Lenstra, Lenstra, and Lovász |
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
The matrix of the lattice for
| 1 | y | x | | | | | | z | | | | | | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 0 | | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 0 | 0 | | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 0 | 0 | 0 | | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 0 | 0 | 0 | 0 | | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 0 | 0 | 0 | 0 | 0 | | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 0 | 0 | 0 | 0 | 0 | 0 | | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| 0 | 0 | 0 | 0 | 0 | 0 | 0 | | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| ★ | 0 | ★ | ★ | ★ | 0 | 0 | 0 | | 0 | 0 | 0 | 0 | 0 | 0 |
| 0 | ★ | 0 | ★ | ★ | 0 | 0 | 0 | ★ | | 0 | 0 | 0 | 0 | 0 |
| 0 | 0 | ★ | 0 | 0 | ★ | ★ | ★ | 0 | 0 | | 0 | 0 | 0 | 0 |
| 0 | 0 | 0 | ★ | 0 | 0 | ★ | ★ | 0 | 0 | ★ | | 0 | 0 | 0 |
| 0 | 0 | 0 | 0 | ★ | 0 | 0 | ★ | 0 | 0 | ★ | ★ | | 0 | 0 |
| ★ | 0 | ★ | ★ | ★ | ★ | ★ | ★ | ★ | 0 | ★ | ★ | ★ | | 0 |
| 0 | ★ | 0 | ★ | ★ | 0 | ★ | ★ | ★ | ★ | ★ | ★ | ★ | ★ | |
References
1. Rivest, R.; Shamir, A.; Adleman, L. A Method for Obtaining digital signatures and public-key cryptosystems. Commun. ACM; 1978; 21, pp. 120-126. [DOI: https://dx.doi.org/10.1145/359340.359342]
2. Wiener, M. Cryptanalysis of short RSA secret exponents. IEEE Trans. Inf. Theory; 1990; 36, pp. 553-558. [DOI: https://dx.doi.org/10.1109/18.54902]
3. Boneh, D.; Durfee, G. Cryptanalysis of RSA with private key d less than N0.292. Advances in Cryptology-Eurocrypt’99, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1999; Volume 1592, pp. 1-11.
4. Quisquater, J.J.; Couvreur, C. Fast decipherment algorithm for RSA public-key cryptosystem. Electron. Lett.; 1982; 18, pp. 905-907. [DOI: https://dx.doi.org/10.1049/el:19820617]
5. Koyama, K.; Maurer, U.M.; Okamoto, T.; Vanstone, S.A. New public-key schemes based on elliptic curves over the ring Zn. Advances in Cryptology—CRYPTO 1991, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1991; Volume 576, pp. 252-266.
6. Collins, T.; Hopkins, D.; Langford, S.; Sabin, M. Public Key Cryptographic Apparatus and Method. US Patent; 5,848,159, 16 January 1997.
7. Takagi, T. A fast RSA-type public-key primitive modulo pkq using Hensel lifting. IEICE Trans.; 2004; 87, pp. 94-101.
8. Murru, N.; Saettone, F.M. A Novel RSA-Like Cryptosystem Based on a Generalization of the Rédei Rational Functions. Number-Theoretic Methods in Cryptology. NuTMiC 2017. Lecture Notes in Computer Science; Kaczorowski, J.; Pieprzyk, J.; Pomykala, J. Springer: Cham, Switzerland, 2018; Volume 10737.
9. Feng, Y.; Nitaj, A.; Pan, Y. Partial prime factor exposure attacks on some RSA variants. Theoretical Computer Science; Elsevier: Amsterdam, The Netherlands, 2024; Volume 999, 114549.
10. Nitaj, A.; Ariffin, M.R.B.K.; Adenan, N.N.H.; Abu, N.A. Classical Attacks on a Variant of the RSA Cryptosystem. LATINCRYPT 2021. Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2021; Volume 12912, pp. 151-167.
11. Shi, G.; Wang, G.; Gu, D. Further Cryptanalysis of a Type of RSA Variants. Information Security. ISC 2022. Lecture Notes in Computer Science; Susilo, W.; Chen, X.; Guo, F.; Zhang, Y.; Intan, R. Springer: Cham, Switzerland, 2022; Volume 13640.
12. Zheng, M.; Kunihiro, N.; Yao, Y. Cryptanalysis of the RSA variant based on cubic Pell equation. Theor. Comput. Sci.; 2021; 889, pp. 135-144. [DOI: https://dx.doi.org/10.1016/j.tcs.2021.08.001]
13. Cotan, P.; Teşeleanu, G. Continued fractions applied to a family of RSA-like cryptosystems. Information Security Practice and Experience. ISPEC 2022. Lecture Notes in Computer Science; Su, C.; Gritzalis, D.; Piuri, V. Springer: Cham, Switzerland, 2022; Volume 13620, pp. 589-605.
14. Nitaj, A.; Adenan, N.N.H.; Ariffin, M.R.K. Cryptanalysis of a New Variant of the RSA Cryptosystem. Progress in Cryptology—AFRICACRYPT 2024. AFRICACRYPT 2024. Lecture Notes in Computer Science; Vaudenay, S.; Petit, C. Springer: Cham, Switzerland, 2024; Volume 14861.
15. Lenstra, A.K.; Lenstra, H.W.; Lovász, L. Factoring polynomials with rational coefficients. Math. Ann.; 1982; 261, pp. 513-534. [DOI: https://dx.doi.org/10.1007/BF01457454]
16. May, A. New RSA Vulnerabilities Using Lattice Reduction Methods. Ph.D. Thesis; University of Paderborn: Paderborn, Germany, 2003.
17. Coppersmith, D. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptol.; 1997; 10, pp. 233-260. [DOI: https://dx.doi.org/10.1007/s001459900030]
18. Howgrave-Graham, N. Finding small roots of univariate modular equations revisited. Cryptography and Coding, LNCS 1355; Springer: Berlin/Heidelberg, Germany, 1997; pp. 131-142.
19. Jochemsz, E.; May, A. A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. ASIACRYPT 2006, LNCS 4284; Springer: Berlin/Heidelberg, Germany, 2006; pp. 267-282.
20. Peng, L.; Hu, L.; Lu, Y.; Wei, H. An improved analysis on three variants of the RSA cryptosystem. Proceedings of the International Conference on Information Security and Cryptology; Beijing, China, 4–6 November 2016; Springer: Cham, Switzerland, 2016; Volume 10143, pp. 140-149.
21. Kunihiro, N. On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. Information Security. ISC 2012. Lecture Notes in Computer Science; Gollmann, D.; Freiling, F.C. Springer: Berlin/Heidelberg, Germany, 2012; Volume 7483.
22. Nitaj, A.; Ariffin, M.R.K.; Nassr, D.I.; Bahig, H.M. New attacks on the RSA cryptosystem. AFRICACRYPT 2014, LNCS 8469; Pointcheval, D.; Vergnaud, D. Springer: Berlin/Heidelberg, Germany, 2014; 178198.
23. Steinfeld, R.; Zheng, Y. On the Security of RSA with Primes Sharing Least-Significant Bits. Appl. Algebra Eng. Commun. Comput.; 2004; 15, 179200. [DOI: https://dx.doi.org/10.1007/s00200-004-0164-6]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In 2022, Cotan and Teşeleanu presented a variant of the RSA cryptosystem where the modulus is of the form
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 ACSA Laboratory, Department of Mathematics and Computer Science, Sciences Faculty, Mohammed First University, Oujda 60000, Morocco;
2 LMNO, CNRS, UNICAEN, Caen Normandie University, 14000 Caen, France