RSA Assumption
The RSA assumption states that the RSA function is hard to invert: given a modulus , a public exponent , and a value , no efficient adversary can find such that . It was introduced alongside the RSA cryptosystem — RSA78.
Assumption
The assumption is parameterized by a group generator that, on input , outputs an RSA modulus (the product of two large primes) together with a public exponent coprime to and the corresponding private exponent .
RSA Problem
In the RSA game, the adversary is given an RSA instance and must produce the RSA inverse: an such that .
\begin{algorithm}
\algname{Game}
\caption{$\Game^{\text{rsa}}_{n,e,\calA}(\secpar)$}
\begin{algorithmic}
\State $(n, e, d) \gets \GrGen(1^\secpar)$
\State $x \getsr \ZZ_n^*$
\State $y \gets x^e \bmod n$
\State $\hat{x} \gets \calA(1^\secpar, n, e, y)$
\Return $[\hat{x}^e \equiv y \pmod{n}]$
\end{algorithmic}
\end{algorithm}
RSA is hard for if for all efficient ,
is negligible.
Known Results
- RSA implies the existence of trapdoor permutations, which in turn imply PKE — RSA78
- Factoring reduces to RSA: an algorithm that inverts for all can be used to factor . The converse direction — whether factoring reduces to RSA for a fixed — is not known.
- Search–decision equivalence: distinguishing RSA outputs from uniform reduces to inverting RSA.
Variations
Strong RSA
The strong RSA assumption strengthens the standard assumption by allowing the adversary to choose the exponent itself (subject to ). Formally, the adversary outputs a pair with and . This is used in constructions of signature schemes and commitments with stronger security guarantees.
Φ-Hiding
The Φ-hiding assumption states that, given and a prime , it is hard to determine whether . This is related to RSA hardness and is used in some private information retrieval constructions.
Attacks
- Shor’s algorithm: a quantum computer can factor in polynomial time and thus break RSA entirely — Shor97
- Wiener’s attack: when the private exponent satisfies , RSA can be broken via continued-fraction approximation of .
- Small-exponent attacks: encrypting the same short message under many independent RSA public keys with a small exponent (e.g., ) allows recovery via the Chinese Remainder Theorem (Håstad’s broadcast attack).
- Chosen-ciphertext attacks: textbook RSA (without padding) is not CCA-secure; OAEP padding is required in practice.