Algebraic attack on NTRU using Witt vectors and Gröbner bases
نویسندگان
چکیده
We present an algebraic attack on NTRU (restricted to the case where the parameter q is a power of two) using the method of the Witt vectors proposed by Silverman, Smart and Vercauteren [17]; the latter considered only the first two bits of a Witt vector attached to the recovering of the secret key in order to reduce the problem to the resolution of an algebraic system over F2. The theoretical complexity of this resolution was not studied by the authors. In this paper, we use the first three bits of the Witt vectors to obtain supplementary equations which allow us to reduce the complexity of the attack. Using Gröbner basis complexity results of overdetermined systems, we have been able to provide a theoretical complexity analysis. Additionally we provide experimental results illustrating the efficiency of this approach. Moreover, we prove that the use of the fourth bit does not improve the complexity, what is surprising. Unfortunately, for standard values of the NTRU parameters, the proven complexity is around 2 and this attack does not make it possible to find the private key.
منابع مشابه
An Algebraic Approach to NTRU (q = 2) via Witt Vectors and Overdetermined Systems of Nonlinear Equations
We use the theory of Witt vectors to develop an algebraic approach for studying the NTRU primitive with q parameter equal to a power of two. This results in a system of nonlinear algebraic equations over F2 having many symmetries, which is reminiscent of the approach of Courtois, Murphy, Pieprzyk, Robshaw and others for studying the structure of block ciphers such as the AES. We study whether t...
متن کاملAn Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations
متن کامل
Non-Commutative Gröbner Bases in Poincaré-Birkhoff-Witt Extensions
Commutative Gröbner Bases are a well established technique with many applications, including polynomial solving and constructive approaches to commutative algebra and algebraic geometry. Noncommutative Gröbner Bases are a focus of much recent research activity. For example, combining invariant theory and elimination theory, or elimination in moving frames of partial differential operators invar...
متن کاملTECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computing Science MASTER ’ S
Recently, a special kind of cryptanalysis coined as the algebraic attack has gained a lot of attention. In this thesis, we clarify this attack and discuss the threat to common ciphers. Among the known attacks, one can roughly distinguish between two classes. The first consists of structural attacks that focus on specific properties of a certain cipher. The second includes inversion attacks, whi...
متن کاملQTRU: A Lattice Attack Resistant Version of NTRU
We propose QTRU, a probabilistic and multi-dimensional public key cryptosystem based on the NTRU public key cryptosystem using quaternion algebra. QTRU encrypts four data vectors in each encryption session and the only other major difference between NTRU and QTRU is that the underlying algebraic structure has been changed to a non-commutative algebraic structure. As a result, QTRU inherits the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Mathematical Cryptology
دوره 3 شماره
صفحات -
تاریخ انتشار 2009