cronokirby

(2026-03) A Generalized Partial Exposure Lattice Attack Against an RSA variant Based on Cubic Pell Curves

2026-03-14

Abstract

Nitaj and Seck recently published an RSA variant (MJAGA 2024) based on the cubic Pell equation Pc(N):u3+cv3+c2w33cuvw=1\mathcal{P}_c(N): u^3+cv^3+c^2w^3-3cuvw= 1 over Z/NZ\mathbb{Z}/N\mathbb{Z} when N=prqsN=p^rq^s. In their cryptosystem, the public exponent ee and the private exponent dd are related to the key equation de1(modp2(r1)q2(s1)(p1)2(q1)2)d\equiv e^{-1}\pmod{p^{2(r-1)}q^{2(s-1)}(p-1)^2(q-1)^2}. In AfricaCrypt 2025, Rahmani and Nitaj published a lattice attack on their scheme in the particular case of r=s=1r=s=1 by exploiting the key equation ed(p1)2(q1)2k=1ed - (p-1)^2(q-1)^2 k = 1.

In this paper, we present a new generalized partial exposure lattice attack on the scheme of Nitaj and Seck by examining the key equation eu0(p1)2(q1)2v0=w0eu_0 - (p-1)^2(q-1)^2 v_0 = w_0 when some bits of pp or qq are known.