Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations

被引:0
|
作者
Nguyen, P [1 ]
Stern, J [1 ]
机构
[1] Ecole Normale Super, Lab Informat, F-75230 Paris 05, France
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptosystems based on the knapsack problem were among the first public key systems to be invented and for a while were considered quite promising. Basically all knapsack cryptosystems that have been proposed so far have been broken, mainly by means of lattice reduction techniques. However, a few knapsack-like cryptosystems have withstood cryptanalysis, among which the Chor-Rivest scheme [2] even if this is debatable (see [16]), and the Qu-Vanstone scheme proposed at the Dagstuhl'93 workshop [13] and published in [14]. The Qu-Vanstone scheme is a public key scheme based on group factorizations in the additive group of integers modulo n that generalizes Merkle-Hellman cryptosystems. In this paper, we present a novel use of lattice reduction, which is of independent interest, exploiting in a systematic manner the notion of an orthogonal lattice. Using the new technique, we successfully attack the Qu-Vanstone cryptosystem. Namely, we show how to recover the private key from the public key. The attack is based on a careful study of the so-called Merkle-Hellman transformation.
引用
收藏
页码:198 / 212
页数:15
相关论文
共 20 条
  • [1] A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem
    Abdel-Basset, Mohamed
    El-Shahat, Doaa
    El-henawy, Ibrahim
    Sangaiah, Arun Kumar
    Ahmed, Syed Hassan
    [J]. MOBILE NETWORKS & APPLICATIONS, 2018, 23 (04): : 723 - 733
  • [2] A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem
    Mohamed Abdel-Basset
    Doaa El-Shahat
    Ibrahim El-henawy
    Arun Kumar Sangaiah
    Syed Hassan Ahmed
    [J]. Mobile Networks and Applications, 2018, 23 : 723 - 733
  • [3] A Novel Public Key Cryptosystem based on Merkle-Hellman Knapsack Cryptosystem
    Thangavel, M.
    Varalakshmi, P.
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 117 - 122
  • [4] Encrypting Messages using the Merkle-Hellman Knapsack Cryptosystem
    Agarwal, Ashish
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (05): : 12 - 14
  • [5] An Improved Attack on the Basic Merkle-Hellman Knapsack Cryptosystem
    Liu, Jiayang
    Bi, Jingguo
    Xu, Songyan
    [J]. IEEE ACCESS, 2019, 7 : 59388 - 59393
  • [6] Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
    Kantour, Nedjmeddine
    Bouroubi, Sadek
    [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 211 - 222
  • [7] Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
    Nedjmeddine Kantour
    Sadek Bouroubi
    [J]. Mobile Networks and Applications, 2020, 25 : 211 - 222
  • [8] RELIABLE BLOCK BASED CRYPTOSYSTEM: COMBINATION OF MERKLE-HELLMAN AND RSA FOR SECURED IMAGE TRANSMISSION
    Lokeshwari, G.
    Kumar, S. Udaya
    Aparna, G.
    [J]. 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 626 - 630
  • [9] Cryptanalyzing Merkle-Hellman Public Key Cryptosystem with Artificial Neural Networks
    Khan, Ahmad Neyaz
    Fan, Ming Yu
    Malik, Asad
    Husain, Mohammed A. Slam
    [J]. 2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [10] Improvement of CBC Encryption Technique by Using the Merkle-Hellman Knapsack Cryptosystem
    Padhmavathi, B.
    Ray, Arghya
    Anjum, Alisha
    Bhat, Santhoshi
    [J]. 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2013), 2013, : 340 - 344