RSA using 2 as a public exponent












4












$begingroup$


I'm failing to see why 2 can never be used and what weaknesses would be associated with doing so.



There's a similar question asking why it has to be in the form of $2^n$+1 but why not $2^n$










share|improve this question









$endgroup$








  • 3




    $begingroup$
    $gcd(2,(p-1)(q-1)) =$?
    $endgroup$
    – kelalaka
    Dec 19 '18 at 12:41










  • $begingroup$
    if p is odd a q is even it will be 1. if both are odd/both are even it will be 2?
    $endgroup$
    – S. L.
    Dec 19 '18 at 12:46










  • $begingroup$
    $p$ and $q$ are prime >2 implies both odd.
    $endgroup$
    – kelalaka
    Dec 19 '18 at 12:46










  • $begingroup$
    right of course! facepalm OK so what weakness would that bring? Edit: scratch that, it would lead to any ct no being uniquely decryptable
    $endgroup$
    – S. L.
    Dec 19 '18 at 12:50








  • 5




    $begingroup$
    en.wikipedia.org/wiki/Rabin_cryptosystem
    $endgroup$
    – Maeher
    Dec 19 '18 at 12:52
















4












$begingroup$


I'm failing to see why 2 can never be used and what weaknesses would be associated with doing so.



There's a similar question asking why it has to be in the form of $2^n$+1 but why not $2^n$










share|improve this question









$endgroup$








  • 3




    $begingroup$
    $gcd(2,(p-1)(q-1)) =$?
    $endgroup$
    – kelalaka
    Dec 19 '18 at 12:41










  • $begingroup$
    if p is odd a q is even it will be 1. if both are odd/both are even it will be 2?
    $endgroup$
    – S. L.
    Dec 19 '18 at 12:46










  • $begingroup$
    $p$ and $q$ are prime >2 implies both odd.
    $endgroup$
    – kelalaka
    Dec 19 '18 at 12:46










  • $begingroup$
    right of course! facepalm OK so what weakness would that bring? Edit: scratch that, it would lead to any ct no being uniquely decryptable
    $endgroup$
    – S. L.
    Dec 19 '18 at 12:50








  • 5




    $begingroup$
    en.wikipedia.org/wiki/Rabin_cryptosystem
    $endgroup$
    – Maeher
    Dec 19 '18 at 12:52














4












4








4


2



$begingroup$


I'm failing to see why 2 can never be used and what weaknesses would be associated with doing so.



There's a similar question asking why it has to be in the form of $2^n$+1 but why not $2^n$










share|improve this question









$endgroup$




I'm failing to see why 2 can never be used and what weaknesses would be associated with doing so.



There's a similar question asking why it has to be in the form of $2^n$+1 but why not $2^n$







rsa public-key






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Dec 19 '18 at 12:40









S. L.S. L.

706




706








  • 3




    $begingroup$
    $gcd(2,(p-1)(q-1)) =$?
    $endgroup$
    – kelalaka
    Dec 19 '18 at 12:41










  • $begingroup$
    if p is odd a q is even it will be 1. if both are odd/both are even it will be 2?
    $endgroup$
    – S. L.
    Dec 19 '18 at 12:46










  • $begingroup$
    $p$ and $q$ are prime >2 implies both odd.
    $endgroup$
    – kelalaka
    Dec 19 '18 at 12:46










  • $begingroup$
    right of course! facepalm OK so what weakness would that bring? Edit: scratch that, it would lead to any ct no being uniquely decryptable
    $endgroup$
    – S. L.
    Dec 19 '18 at 12:50








  • 5




    $begingroup$
    en.wikipedia.org/wiki/Rabin_cryptosystem
    $endgroup$
    – Maeher
    Dec 19 '18 at 12:52














  • 3




    $begingroup$
    $gcd(2,(p-1)(q-1)) =$?
    $endgroup$
    – kelalaka
    Dec 19 '18 at 12:41










  • $begingroup$
    if p is odd a q is even it will be 1. if both are odd/both are even it will be 2?
    $endgroup$
    – S. L.
    Dec 19 '18 at 12:46










  • $begingroup$
    $p$ and $q$ are prime >2 implies both odd.
    $endgroup$
    – kelalaka
    Dec 19 '18 at 12:46










  • $begingroup$
    right of course! facepalm OK so what weakness would that bring? Edit: scratch that, it would lead to any ct no being uniquely decryptable
    $endgroup$
    – S. L.
    Dec 19 '18 at 12:50








  • 5




    $begingroup$
    en.wikipedia.org/wiki/Rabin_cryptosystem
    $endgroup$
    – Maeher
    Dec 19 '18 at 12:52








3




3




$begingroup$
$gcd(2,(p-1)(q-1)) =$?
$endgroup$
– kelalaka
Dec 19 '18 at 12:41




$begingroup$
$gcd(2,(p-1)(q-1)) =$?
$endgroup$
– kelalaka
Dec 19 '18 at 12:41












$begingroup$
if p is odd a q is even it will be 1. if both are odd/both are even it will be 2?
$endgroup$
– S. L.
Dec 19 '18 at 12:46




$begingroup$
if p is odd a q is even it will be 1. if both are odd/both are even it will be 2?
$endgroup$
– S. L.
Dec 19 '18 at 12:46












$begingroup$
$p$ and $q$ are prime >2 implies both odd.
$endgroup$
– kelalaka
Dec 19 '18 at 12:46




$begingroup$
$p$ and $q$ are prime >2 implies both odd.
$endgroup$
– kelalaka
Dec 19 '18 at 12:46












$begingroup$
right of course! facepalm OK so what weakness would that bring? Edit: scratch that, it would lead to any ct no being uniquely decryptable
$endgroup$
– S. L.
Dec 19 '18 at 12:50






$begingroup$
right of course! facepalm OK so what weakness would that bring? Edit: scratch that, it would lead to any ct no being uniquely decryptable
$endgroup$
– S. L.
Dec 19 '18 at 12:50






5




5




$begingroup$
en.wikipedia.org/wiki/Rabin_cryptosystem
$endgroup$
– Maeher
Dec 19 '18 at 12:52




$begingroup$
en.wikipedia.org/wiki/Rabin_cryptosystem
$endgroup$
– Maeher
Dec 19 '18 at 12:52










1 Answer
1






active

oldest

votes


















12












$begingroup$

It is not that RSA becomes insecure when used with public exponent $2$. (In fact, the Rabin Cryptosystem does exactly that.) It's that it doesn't actually work.



The problem is that for $N = pq$ for two primes $p$ and $q$, the function $f : x mapsto x^2 bmod N$ is not injective. So it is impossible to invert uniquely. In fact, most elements of the function's range (the set of perfect squares) have $4$ preimages under $f$. (As pointed out by Thomas Pornin, the multiples of $p$ and $q$ have $2$, while $0$ has only one.)



We can get around this problem by choosing $pequiv qequiv 3 bmod 4$ and restricting the domain to the set of quadratic residues. In this case, the function is a trapdoor permutation over the set of quadratic residues if factoring is hard.



One might note, that this is actually a better guarantee than the one we have for the RSA trapdoor permutation, where the security is not known to be implied by the hardness of factoring.






share|improve this answer











$endgroup$









  • 5




    $begingroup$
    Technically, most elements have 4 square roots, but some have only two, and zero has only one. The elements that have only two square roots are the non-zero elements that happen to be a multiple of either $p$ or $q$. Of course, it is extremely improbable to hit one such element out of (bad) luck.
    $endgroup$
    – Thomas Pornin
    Dec 19 '18 at 13:37










  • $begingroup$
    @ThomasPornin You are of course correct.
    $endgroup$
    – Maeher
    Dec 19 '18 at 13:44






  • 1




    $begingroup$
    The last sentence might be worth emphasizing: unlike RSA, the Rabin cryptosystem is provably as hard as factoring (i.e. breaking it provides efficient factoring as a side effect).
    $endgroup$
    – R..
    Dec 19 '18 at 16:25










  • $begingroup$
    @R.. I left that out because it did not seem particularly relevant to the question being asked, but I added a comment about it now.
    $endgroup$
    – Maeher
    Dec 19 '18 at 16:35










  • $begingroup$
    @Maeher: Thanks. I think it's nice because it confirms whatever suspicion the OP had that 2 is actually an interesting and productive choice of exponent.
    $endgroup$
    – R..
    Dec 19 '18 at 16:45











Your Answer





StackExchange.ifUsing("editor", function () {
return StackExchange.using("mathjaxEditing", function () {
StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix) {
StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
});
});
}, "mathjax-editing");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "281"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f65983%2frsa-using-2-as-a-public-exponent%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









12












$begingroup$

It is not that RSA becomes insecure when used with public exponent $2$. (In fact, the Rabin Cryptosystem does exactly that.) It's that it doesn't actually work.



The problem is that for $N = pq$ for two primes $p$ and $q$, the function $f : x mapsto x^2 bmod N$ is not injective. So it is impossible to invert uniquely. In fact, most elements of the function's range (the set of perfect squares) have $4$ preimages under $f$. (As pointed out by Thomas Pornin, the multiples of $p$ and $q$ have $2$, while $0$ has only one.)



We can get around this problem by choosing $pequiv qequiv 3 bmod 4$ and restricting the domain to the set of quadratic residues. In this case, the function is a trapdoor permutation over the set of quadratic residues if factoring is hard.



One might note, that this is actually a better guarantee than the one we have for the RSA trapdoor permutation, where the security is not known to be implied by the hardness of factoring.






share|improve this answer











$endgroup$









  • 5




    $begingroup$
    Technically, most elements have 4 square roots, but some have only two, and zero has only one. The elements that have only two square roots are the non-zero elements that happen to be a multiple of either $p$ or $q$. Of course, it is extremely improbable to hit one such element out of (bad) luck.
    $endgroup$
    – Thomas Pornin
    Dec 19 '18 at 13:37










  • $begingroup$
    @ThomasPornin You are of course correct.
    $endgroup$
    – Maeher
    Dec 19 '18 at 13:44






  • 1




    $begingroup$
    The last sentence might be worth emphasizing: unlike RSA, the Rabin cryptosystem is provably as hard as factoring (i.e. breaking it provides efficient factoring as a side effect).
    $endgroup$
    – R..
    Dec 19 '18 at 16:25










  • $begingroup$
    @R.. I left that out because it did not seem particularly relevant to the question being asked, but I added a comment about it now.
    $endgroup$
    – Maeher
    Dec 19 '18 at 16:35










  • $begingroup$
    @Maeher: Thanks. I think it's nice because it confirms whatever suspicion the OP had that 2 is actually an interesting and productive choice of exponent.
    $endgroup$
    – R..
    Dec 19 '18 at 16:45
















12












$begingroup$

It is not that RSA becomes insecure when used with public exponent $2$. (In fact, the Rabin Cryptosystem does exactly that.) It's that it doesn't actually work.



The problem is that for $N = pq$ for two primes $p$ and $q$, the function $f : x mapsto x^2 bmod N$ is not injective. So it is impossible to invert uniquely. In fact, most elements of the function's range (the set of perfect squares) have $4$ preimages under $f$. (As pointed out by Thomas Pornin, the multiples of $p$ and $q$ have $2$, while $0$ has only one.)



We can get around this problem by choosing $pequiv qequiv 3 bmod 4$ and restricting the domain to the set of quadratic residues. In this case, the function is a trapdoor permutation over the set of quadratic residues if factoring is hard.



One might note, that this is actually a better guarantee than the one we have for the RSA trapdoor permutation, where the security is not known to be implied by the hardness of factoring.






share|improve this answer











$endgroup$









  • 5




    $begingroup$
    Technically, most elements have 4 square roots, but some have only two, and zero has only one. The elements that have only two square roots are the non-zero elements that happen to be a multiple of either $p$ or $q$. Of course, it is extremely improbable to hit one such element out of (bad) luck.
    $endgroup$
    – Thomas Pornin
    Dec 19 '18 at 13:37










  • $begingroup$
    @ThomasPornin You are of course correct.
    $endgroup$
    – Maeher
    Dec 19 '18 at 13:44






  • 1




    $begingroup$
    The last sentence might be worth emphasizing: unlike RSA, the Rabin cryptosystem is provably as hard as factoring (i.e. breaking it provides efficient factoring as a side effect).
    $endgroup$
    – R..
    Dec 19 '18 at 16:25










  • $begingroup$
    @R.. I left that out because it did not seem particularly relevant to the question being asked, but I added a comment about it now.
    $endgroup$
    – Maeher
    Dec 19 '18 at 16:35










  • $begingroup$
    @Maeher: Thanks. I think it's nice because it confirms whatever suspicion the OP had that 2 is actually an interesting and productive choice of exponent.
    $endgroup$
    – R..
    Dec 19 '18 at 16:45














12












12








12





$begingroup$

It is not that RSA becomes insecure when used with public exponent $2$. (In fact, the Rabin Cryptosystem does exactly that.) It's that it doesn't actually work.



The problem is that for $N = pq$ for two primes $p$ and $q$, the function $f : x mapsto x^2 bmod N$ is not injective. So it is impossible to invert uniquely. In fact, most elements of the function's range (the set of perfect squares) have $4$ preimages under $f$. (As pointed out by Thomas Pornin, the multiples of $p$ and $q$ have $2$, while $0$ has only one.)



We can get around this problem by choosing $pequiv qequiv 3 bmod 4$ and restricting the domain to the set of quadratic residues. In this case, the function is a trapdoor permutation over the set of quadratic residues if factoring is hard.



One might note, that this is actually a better guarantee than the one we have for the RSA trapdoor permutation, where the security is not known to be implied by the hardness of factoring.






share|improve this answer











$endgroup$



It is not that RSA becomes insecure when used with public exponent $2$. (In fact, the Rabin Cryptosystem does exactly that.) It's that it doesn't actually work.



The problem is that for $N = pq$ for two primes $p$ and $q$, the function $f : x mapsto x^2 bmod N$ is not injective. So it is impossible to invert uniquely. In fact, most elements of the function's range (the set of perfect squares) have $4$ preimages under $f$. (As pointed out by Thomas Pornin, the multiples of $p$ and $q$ have $2$, while $0$ has only one.)



We can get around this problem by choosing $pequiv qequiv 3 bmod 4$ and restricting the domain to the set of quadratic residues. In this case, the function is a trapdoor permutation over the set of quadratic residues if factoring is hard.



One might note, that this is actually a better guarantee than the one we have for the RSA trapdoor permutation, where the security is not known to be implied by the hardness of factoring.







share|improve this answer














share|improve this answer



share|improve this answer








edited Dec 19 '18 at 16:28

























answered Dec 19 '18 at 13:19









MaeherMaeher

3,60411830




3,60411830








  • 5




    $begingroup$
    Technically, most elements have 4 square roots, but some have only two, and zero has only one. The elements that have only two square roots are the non-zero elements that happen to be a multiple of either $p$ or $q$. Of course, it is extremely improbable to hit one such element out of (bad) luck.
    $endgroup$
    – Thomas Pornin
    Dec 19 '18 at 13:37










  • $begingroup$
    @ThomasPornin You are of course correct.
    $endgroup$
    – Maeher
    Dec 19 '18 at 13:44






  • 1




    $begingroup$
    The last sentence might be worth emphasizing: unlike RSA, the Rabin cryptosystem is provably as hard as factoring (i.e. breaking it provides efficient factoring as a side effect).
    $endgroup$
    – R..
    Dec 19 '18 at 16:25










  • $begingroup$
    @R.. I left that out because it did not seem particularly relevant to the question being asked, but I added a comment about it now.
    $endgroup$
    – Maeher
    Dec 19 '18 at 16:35










  • $begingroup$
    @Maeher: Thanks. I think it's nice because it confirms whatever suspicion the OP had that 2 is actually an interesting and productive choice of exponent.
    $endgroup$
    – R..
    Dec 19 '18 at 16:45














  • 5




    $begingroup$
    Technically, most elements have 4 square roots, but some have only two, and zero has only one. The elements that have only two square roots are the non-zero elements that happen to be a multiple of either $p$ or $q$. Of course, it is extremely improbable to hit one such element out of (bad) luck.
    $endgroup$
    – Thomas Pornin
    Dec 19 '18 at 13:37










  • $begingroup$
    @ThomasPornin You are of course correct.
    $endgroup$
    – Maeher
    Dec 19 '18 at 13:44






  • 1




    $begingroup$
    The last sentence might be worth emphasizing: unlike RSA, the Rabin cryptosystem is provably as hard as factoring (i.e. breaking it provides efficient factoring as a side effect).
    $endgroup$
    – R..
    Dec 19 '18 at 16:25










  • $begingroup$
    @R.. I left that out because it did not seem particularly relevant to the question being asked, but I added a comment about it now.
    $endgroup$
    – Maeher
    Dec 19 '18 at 16:35










  • $begingroup$
    @Maeher: Thanks. I think it's nice because it confirms whatever suspicion the OP had that 2 is actually an interesting and productive choice of exponent.
    $endgroup$
    – R..
    Dec 19 '18 at 16:45








5




5




$begingroup$
Technically, most elements have 4 square roots, but some have only two, and zero has only one. The elements that have only two square roots are the non-zero elements that happen to be a multiple of either $p$ or $q$. Of course, it is extremely improbable to hit one such element out of (bad) luck.
$endgroup$
– Thomas Pornin
Dec 19 '18 at 13:37




$begingroup$
Technically, most elements have 4 square roots, but some have only two, and zero has only one. The elements that have only two square roots are the non-zero elements that happen to be a multiple of either $p$ or $q$. Of course, it is extremely improbable to hit one such element out of (bad) luck.
$endgroup$
– Thomas Pornin
Dec 19 '18 at 13:37












$begingroup$
@ThomasPornin You are of course correct.
$endgroup$
– Maeher
Dec 19 '18 at 13:44




$begingroup$
@ThomasPornin You are of course correct.
$endgroup$
– Maeher
Dec 19 '18 at 13:44




1




1




$begingroup$
The last sentence might be worth emphasizing: unlike RSA, the Rabin cryptosystem is provably as hard as factoring (i.e. breaking it provides efficient factoring as a side effect).
$endgroup$
– R..
Dec 19 '18 at 16:25




$begingroup$
The last sentence might be worth emphasizing: unlike RSA, the Rabin cryptosystem is provably as hard as factoring (i.e. breaking it provides efficient factoring as a side effect).
$endgroup$
– R..
Dec 19 '18 at 16:25












$begingroup$
@R.. I left that out because it did not seem particularly relevant to the question being asked, but I added a comment about it now.
$endgroup$
– Maeher
Dec 19 '18 at 16:35




$begingroup$
@R.. I left that out because it did not seem particularly relevant to the question being asked, but I added a comment about it now.
$endgroup$
– Maeher
Dec 19 '18 at 16:35












$begingroup$
@Maeher: Thanks. I think it's nice because it confirms whatever suspicion the OP had that 2 is actually an interesting and productive choice of exponent.
$endgroup$
– R..
Dec 19 '18 at 16:45




$begingroup$
@Maeher: Thanks. I think it's nice because it confirms whatever suspicion the OP had that 2 is actually an interesting and productive choice of exponent.
$endgroup$
– R..
Dec 19 '18 at 16:45


















draft saved

draft discarded




















































Thanks for contributing an answer to Cryptography Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


Use MathJax to format equations. MathJax reference.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f65983%2frsa-using-2-as-a-public-exponent%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Bressuire

Cabo Verde

Gyllenstierna