2

I am trying to crack an unpadded RSA set up for a homework.

I have public key (R,e) and encrypted message E.

R:=1189873858375600120035497781492406260116261348762168101523668479976252918878873543993974091515716923413521166189;
e:=7;
E:=935688997292570230577548538417371291686892187342525833188430568797480485753147343888751799688783739259397891334;

Obviously, the attack that I'm supposed to use has something to do with the size of the public encryption exponent but I'm struggling to see exactly how to use it.

I understand the relationship between e, d and φ(n) and understand that there is an integer k < min{e, d} such that φ(n) = (e ∗ d − 1)/k but I don't understand how I can use that fact to brute force discover φ(n).

It appears that the solution comes from doing some kind of search from 1..k but since d is still unknown, I don't really see how to take advantage of that.

Can someone enlighten me, please?

Reuben Tanner
  • 146
  • 12
  • 4
    I suspect that the smallness of the encryption exponent has nothing to do with it; instead, consider the modulus, which is approximately circa 372 bits long; how can you take advantage of that? – poncho Oct 01 '14 at 03:31
  • 2
    To elaborate a bit on poncho's comment, most real world RSA encryption schemes use small encryption exponents for performance, usually 3, 17 or 65537 - so $e = 7$ may not be of any help! – Thomas Oct 01 '14 at 06:43
  • If the message is shorter than the length of the modulus divided by the public exponent, you can simply compute the $e$ root, for example via binary search. For real RSA the padding ensures that the message has similar length as the modulus, but for unpadded RSA short messages can happen. – CodesInChaos Oct 01 '14 at 08:10
  • 2
    The actual statement (see Problem 2) does not hint that padding or small exponent are relevant, so I guess Poncho hinted to the expected resolution path. $;$ Notice that this homework is not quite past its due date + allowance; please do not post a solution before that. – fgrieu Oct 01 '14 at 08:26
  • @fgrieu If this is indeed the expected resolution path, it will be somewhat difficult to produce a solution before the deadline at this point :-) – Thomas Oct 01 '14 at 08:31
  • 1
  • Simply running a factoring software sounds a little dull for a homework question. It's also weird that the moduli for Problem 1 are smaller. If you bothered to setup factoring software for Problem 2 you use it to solve problem 1 as well, without exploiting the same message encryption weakness. 2) the short message and small exponent approach doesn't seem to work.
  • – CodesInChaos Oct 01 '14 at 09:54
  • Hi Karios, I got into similar assignment but n is way too large in my case almost 1000 bits so pls let me know if you did anything other than factoring? – codeomnitrix Nov 25 '14 at 06:47