Security Analysis of Modified ESRKGS-RSA Using Lenstra’s Elliptic Curve Method
Abstract
The Enhanced and Secure RSA Key Generation Scheme (ESRKGS), introduced in 2014, aimed to improve RSA security by employing a modulus constructed from four prime factors. However, subsequent studies in 2016 revealed that this structure did not provide additional security over standard RSA. In response, a modified version of ESRKGS was proposed in 2021, incorporating dual encoding techniques using a masking parameter γ and double encryption. This study evaluates the security of the modified ESRKGS by simulating an attack scenario in which the adversary is assumed to know of ϕ(N ), enabling recovery of encrypted messages. Additionally, we implement Lenstra’s Elliptic Curve Method (ECM) to assess the factorization resistance of the four-prime modulus when ϕ(N ) is not known. Experimental results indicate that ECM can efficiently factor the modulus into its four constituent primes under practical time constraints. These findings demonstrate that, despite recent modifications, the ESRKGS variant remains vulnerable to factorization based attacks. This highlights the necessity for more rigorous cryptographic design principles in multiprime RSA systems and calls into question the long-term viability of ESRKGS-based schemes in high-security applications.
Keywords
Full Text:
PDFReferences
Ravi Sankar Dhakar, Amit Kumar Gupta, Prashant Sharma. Modified RSA Encryption Algorithm (MREA). 2012 Second International Conference on Advanced Computing & Communication Technologies (ACCT), Rohtak, India, 2012. https://doi.org/10.1109/ACCT.2012.74
Yuh-Sien Sun, Che Wun Chiou, Wei-Cheng Sun. A Factorization Attack Algorithm on RSA Cryptosystem Using Fast Searching Algorithm. Journal of Applied Mathematics and Computation, 6(4):390–404, 2022. https://doi.org/10.26855/jamc.2022.12.001
Yan, Song Y. Cryptanalytic Attacks on RSA. Springer, 2008. https://doi.org/10.1007/978-0-387-48742-7
Mark Stamp, Richard lOW. Applied Cryptanalysis: Breaking Ciphers in the Real World. Jon Wiley and Sons, 2007. https://doi.org/10.1002/9780470148778
M. Jason Hinek. Cryptanalysis of RSA and Its Variants. Chapman & Hall, 2009. https://doi.org/10.1201/9781420075199
Ikhwanul Hakim Masri, Bety Hayat Susanti. Cryptanalysis on polynomial congruence-based public key with Chinese Remainder Theorem. 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), Bogor, Indonesia, pp.159–164, 2023. https://doi.org/10.1109/ICoCICs58778.2023.10276994
I Ketut Yudi Sucipta, Bety Hayat Susanti, Sa'aadah Sajjana Carita. Cryptanalysis of the RSA cryptosystem based on n prime numbers. 2024 7th International Conference on Information and Communications Technology (ICOIACT), Ishikawa, Japan, 2024. https://doi.org/10.1109/ICOIACT64819.2024.10912893
Dandi Agus Ferdianto, Bety Hayat Susanti, Sri Rosdiana. Common modulus attack on the elliptic curve-based RSA algorithm variant. 2024 7th International Conference on Information and Communications Technology (ICOIACT), Ishikawa, Japan, 2024. https://doi.org/10.1109/ICOIACT64819.2024.10913331
Phong Q. Nguyen. Public-Key Cryptanalysis. In: I. Luengo (ed.), Recent Trends in Cryptography, AMS–RSME, vol. 477, 2009. https://www.di.ens.fr/~pnguyen/PubSantanderNotes.pdf
Dan Zhang, Hui Wang, Shuang Li, Baonan Wang. Progress in the prime factorization of large numbers. The Journal of Supercomputing, 80(8):11382–11400, 2024. https://doi.org/10.1007/s11227-023-05876-y
M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya. An Enhanced and Secured RSA Key Generation Scheme (ESRKGS). Journal of Information Security and Applications, 20:3–10, 2015. https://doi.org/10.1016/j.jisa.2014.10.004
Erkam Lüy, Zekeriya Y. Karatas, Huseyin Ergin. Comment on “An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)”. Journal of Information Security and Applications, 30:1–2, 2016. https://doi.org/10.1016/j.jisa.2016.03.006
Tifa Fatmala Azzahra. Modifikasi Algoritme ESRKGS Thangavel et al. Menggunakan Metode Multi Kunci dan Teorema Sisa Cina. Undergraduate thesis, Department of Cryptography, National Cyber and Crypto Polytechnic, 2021. https://kc3.poltekssn.ac.id/opac/index.php?p=show_detail&id=10971&keywords=
Gadhing Putra Aditya, Aminuddin Aminuddin, Sofyan Arifianto. Improvisasi Algoritma RSA Menggunakan Generate Key ESRKGS pada Instant Messaging Berbasis Socket TCP. Jurnal Repositor, 2(11), 2020. https://doi.org/10.22219/repositor.v2i11.30959
Aminuddin Aminuddin, Gadhing Putra Aditya, Sofyan Arifianto. RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol. Jurnal Teknologi dan Sistem Komputer, 8(2):113–120, 2020. https://doi.org/10.14710/jtsiskom.8.2.2020.113-120
Eden Megerssa Horra, Asrat Mulatu Beyene, Sofonias Yitagesu Techan. Enhanced Avalanche Effect Analysis Algorithm Considering both Single and Double Key Pair RSA Algorithms. Research Square, 2024. https://doi.org/10.21203/rs.3.rs-4113962/v1
Desi Wulansari, Much Aziz Muslim, Endang Sugiharti. Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N 1024 Bit and 4096 Bit. International Journal of Computer Science and Security (IJCSS), 10(5):186–194, 2016. https://www.cscjournals.org/library/manuscriptinfo.php?mc=IJCSS-1289
Yasin Fitri Alias, Mohd Anuar Mat Isa, Habibah Hashim. Timing Attack: An Analysis of Preliminary Data. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1–4):29–32, 2017. https://jtec.utem.edu.my/jtec/article/view/1774
H. W. Lenstra Jr. Factoring Integers with Elliptic Curves. The Annals of Mathematics, 126(3):649–673, 1987. https://www.jstor.org/stable/1971363
P. W. Shor. Algorithms for quantum computation: discrete logarithms and factoring. Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994. https://doi.org/10.1109/SFCS.1994.365700
Bety Hayat Susanti, Tsamara Khadijah Silim, Nadia Paramita Retno Adiati, Mareta Wahyu Ardyani. eth Root Attack on Dual Modulus RSA. ZERO: Jurnal Sains, Matematika dan Terapan, 9(1):289–296, 2025. https://doi.org/10.30829/zero.v9i1.24486
DOI: https://doi.org/10.18860/cauchy.v10i2.32189
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Bety Hayat Susanti, Aditya Sukhoi Lean Sumule, Mareta Wahyu Ardyani

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Editorial Office
Mathematics Department,
Universitas Islam Negeri Maulana Malik Ibrahim Malang
Gajayana Street 50 Malang, East Java, Indonesia 65144
Faximile (+62) 341 558933
e-mail: cauchy@uin-malang.ac.id

CAUCHY: Jurnal Matematika Murni dan Aplikasi is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.







