Cryptanalysis of a fast public key cryptosystem presented at SAC '91

被引:0
|
作者
Nguyen, P [1 ]
Stern, J [1 ]
机构
[1] Ecole Normale Super, Lab Informat, F-75230 Paris 05, France
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
At SAC '97, Itoh, Okamoto and Mambo presented a fast public key cryptosystem. After analyzing several attacks including lattice-reduction attacks, they claimed that its security was high, although the cryptosystem had some resemblances with the former knapsack cryptosystems, since decryption could be viewed as a multiplicative knapsack problem. In this paper, we show how to recover the private key from a fraction of the public key in less than 10 minutes for the suggested choice of parameters. The attack is based on a systematic use of the notion of the orthogonal lattice which we introduced as a cryptographic tool at Crypto '97. This notion allows us to attack the linearity hidden in the scheme.
引用
收藏
页码:213 / 218
页数:6
相关论文
共 50 条
  • [1] Cryptanalysis of a Knapsack Public Key Cryptosystem
    Wang, Baocang
    Liu, Hui
    Hu, Yupu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 49 - +
  • [2] Cryptanalysis on a finite automaton public key cryptosystem
    戴大为
    吴逵
    张焕国
    [J]. Science China Technological Sciences, 1996, (01) : 27 - 36
  • [3] Cryptanalysis of the WD public-key cryptosystem
    Huang, HF
    Chang, CC
    [J]. FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 249 - 254
  • [4] Cryptanalysis of an improved MFE public key cryptosystem
    [J]. Xu, Z. (xzh_tiger@yahoo.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07):
  • [5] CRYPTANALYSIS OF MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    KORZHIK, VI
    TURKIN, AI
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 68 - 70
  • [6] Cryptanalysis on a finite automaton public key cryptosystem
    Dai, DW
    Wu, K
    Zhang, HG
    [J]. SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 1996, 39 (01): : 27 - 36
  • [7] Cryptanalysis of a public key cryptosystem based on boolean permutations
    Elsheh, Esam
    Youssef, Amr
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2011, 14 (02): : 107 - 115
  • [8] Side channel cryptanalysis on XTR public key cryptosystem
    Han, DG
    Izu, T
    Lim, J
    Sakurai, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (05): : 1214 - 1223
  • [9] Cryptanalysis of the MST3 public key cryptosystem
    Blackburn, Simon R.
    Cid, Carlos
    Mullan, Ciaran
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2009, 3 (04) : 321 - 338
  • [10] Cryptanalysis of the Wu-Dawson public key cryptosystem
    Roelse, P
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 1999, 5 (04) : 386 - 392