I have a protocol where I need to encrypt an elliptic curve exponent in RSA, but the elliptic curve exponent is only 256 bit. I have all the zero-knowledge proofs required to prove that it is done correctly, but I am unsure as to whether my adversary will be able to read the message in any reasonable amount of time. My proofs only work on textbook RSA, so I am stuck with textbook RSA.
My only concern is with the adversary being able to read the messages. For the life cycle of this RSA key, there will only be 2 different RSA ciphertexts of this kind (as well as a few Paillier ciphertexts).
I know that textbook RSA doesn't have IND-CPA, so if they do guess the message that they can confirm it, but guessing a 256-bit message will take a long time, so (unless I am wrong) this shouldn't be a problem. I know that they can alter the message, but that has no effect on my protocol as the receiving party is the only one interested and there are zero-knowledge proofs ensuring the validity of the message.
I am using 65537 as my exponent $e$.
My messages in RSA only need to be secure for a week at most.
I don't work with RSA that much, so I am concerned that I am missing something that might known in the RSA world.
My concern is that the message space of my random number is significantly smaller than the RSA message space, which maybe could cause problems.