layout | title | permalink |
---|---|---|
page |
RSA assumptions |
/rsa-assumptions/ |
Most assumptions are formulated with respect to the security parameter
The RSA Assumption states that no
efficient adversary can compute
The Strong RSA Assumption states that no
efficient adversary can compute roots of a random group element. Specifically,
it holds for
Let
The QR-Strong RSA Assumption states that no
efficient adversary can compute a root of a given random quadratic residue. Specifically,
it holds for
The
Remarks:
- For
$$r = 1$$ the definition is identical to the standard Strong RSA Assumption. - For
$$r = 2$$ , the adversary is efficiently able to take square roots. In class groups of imaginary quadratic order taking square roots is easy [1]. - In
$$r$$ -th order class groups taking$$r$$ -th roots is easy [1].
The Adaptive Root Assumption holds for
$$ \displaystyle \mathrm{Pr} \begin{bmatrix} &\mathbb{G}\xleftarrow{$}\mathrm{GGen}(\lambda)\ & (w,st)\xleftarrow{}\mathcal{A}0(\mathbb{G})\ u^l = w\neq 1 :& l\xleftarrow{$}\Pi{\lambda}=\mathrm{\mathrm{Pr}imes}(\lambda)\ &u \xleftarrow{} \mathcal{A}_1(w,l,st) \end{bmatrix}\leq \mathrm{negl}(\lambda) $$
Remarks:
- The number of primes in
$$\Pi_{\lambda}$$ should be exponential in$$\lambda$$ : it is possible to precompute$$w$$ using$$2^{\Pi_{\lambda}}$$ exponentiations. Then, an adversary with$$2^M$$ memory can store intermediate exponents and compute adaptive roots using$$2^{\Pi_{\lambda}-M}$$ exponentiations for each.
The Order assumption. For any probabilistic polynomial time adversary
The Low Order assumption. For any probabilistic polynomial time adversary
The Fractional Root assumption. For any probabilistic polynomial time adversary
The Diffie-Hellman Assumption holds for
The Discrete Logarithm assumption
holds for
The Factoring assumption states that for random primes
- The Adaptive Root assumption implies the Low Order assumption. Indeed, for an element
$$w$$ of order$$l$$ one can compute a$$q$$ -th root by setting$$u = w^{q^{-1}\bmod{l}}$$ . - The Strong RSA assumption implies the RSA assumption (trivially).
- The Strong RSA assumption implies the QR-Strong assumption (almost trivial, due to the size of
$$QR_N$$ ). - For
$$N=pq$$ , where$$p \neq q$$ are safe primes, the Low Order assumption unconditionally holds in$$QR_N$$ , because it contains no elements of low order. - For an RSA modulus
$$N$$ , the Order assumption in the multiplicative group mod$$N$$ is equivalent to factoring. - The Low Order assumption in the multiplicative group mod
$$N$$ implies factoring in the case where$$l$$ is even and$$u^(l/2) /neq -1 (mod N)$$ . Indeed, in this case,$$u^l-1$$ admits a non-trivial decomposition modulo N, which leads to factoring
-
The Factoring assumption implies the Discrete Logarithm assumption in an RSA group. [2]
-
The Strong RSA assumption is equivalent to the Fractional Root Assumption in the group of quadratic residues modulo
$$N$$ . [3]
A generic group algorithm is a program that performs only group operations and equality checks. The group is modelled as an oracle
It is crucial that a generic group algorithm does not have access to the internal representation of group elements, which are integers in RSA. Most RSA assumptions hold in the Generic Group Model.
- The Strong RSA assumption holds in the Generic Group Model. [4]
This implies that the RSA assumption is hard too. The Factoring assumption can not be formulated in the Generic Group Model as the group size is unknown to the algorithm.
- The Adaptive Root assumption holds in the Generic Group Model. [1]
However, these results give little insight to the actual security of RSA assumptions, as most existing RSA attacks use the integer form of the group elements. For example, computing the Jacobi symbol (see below) in an RSA group is easy despite being provably hard in the Generic Group Model.
Here we consider algorithms that are given the unit ring element
-
If there is a generic ring algorithm that computes
$$f(x)$$ such that$$f(x)\equiv 0 \bmod{n}$$ on a non-negligible fraction of points then one can derive a factoring algorithm. [6] -
If there is an generic ring algorithm that breaks the Strong RSA assumption by outputting rational functions
$$u=\frac{f(x)}{g(x)}$$ and$$l=\frac{h(x)}{q(x)}$$ , then$$N$$ can be factored with the same complexity. [7]
Let
Let
Informally, a group is pseudo-free if no efficient algorithm can find a non-trivial relation among randomly chosen group elements. Recall that a safe prime
-
Assume that
$$N$$ is the product of two safe primes. Then the Strong RSA assumption is equivalent to the RSA group being pseudo-free. [9, 10] -
The Order assumption holds in a pseudo-free group. [8]
-
The Diffie-Hellman assumption holds for a non-negligible fraction of bases
$$g$$ in a pseudo-free group. [9]
Therefore, the Strong RSA assumption implies the Order assumption if
[1] Benedikt Bunz, Ben Fisch, and Alan Szepieniec. Transparent snarks from dark compilers. Cryptology ePrint Archive, Report 2019/1229, 2019. https://eprint.iacr.org/2019/1229.
[2] Eric Bach. Discrete logarithms and factoring. Computer Science Division, University of California Berkeley, 1984. Available at https://www2.eecs.berkeley.edu/Pubs/TechRpts/1984/CSD-84-186.pdf.
[3] Ronald Cramer and Victor Shoup. Signature schemes based on the strong RSA assumption. In ACM Conference on Computer and Communications Security, pages 46–51. ACM, 1999.
[4] Ivan Damgård and Maciej Koprowski. Generic lower bounds for root extraction and signature schemes in general groups. In EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, pages 256--271. Springer, 2002.
[5] Divesh Aggarwal and Ueli M. Maurer. Breaking RSA generically is equivalent to factoring. In EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, pages 36–53. Springer, 2009.
[6] Divesh Aggarwal, Ueli Maurer, and Igor Shparlinski. The equivalence of strong rsa and factoring in the generic ring model of computation. 2011. Available at https://hal.inria.fr/inria-00607256/ document.
[7] Daniele Micciancio. The RSA group is pseudo-free. In EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 387–403. Springer, 2005.
[8] Ronald L. Rivest. On the notion of pseudo-free groups. In TCC, volume 2951 of Lecture Notes in Computer Science, pages 505–521. Springer, 2004.
[9] Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, and Katsuhiro Tashiro. On the pseudo-freeness and the CDH assumption. Int. J. Inf. Sec., 8(5):347–355, 2009.