Protecting NTRU Against Chosen Ciphertext and Reaction Attacks

نویسندگان

  • Jeffrey Hoffstein
  • Joseph H. Silverman
چکیده

This report describes how the Fujisaki-Okamoto SelfReferential Technique (FOSRT) can be used to make the NTRU Public Key Cryptosystem resistant to adaptive chosen ciphertext attacks and to reaction attacks. Many asymmetric ciphers are susceptible to (adaptive) chosen ciphertext attacks. An attacker sends a series of purported ciphertexts e1, e2, . . . and uses the decryptions to deduce information about either the secret key or about an intercepted ciphertext e that was used to create e1, e2, . . .. The user Alice may try to guard against such attacks by padding her plaintext so that Bob can detect valid plaintexts from invalid plaintexts, but then the attacker may be able to gain useful information by simply observing which ciphertexts are accepted and which ciphertexts are rejected. An example of such an attack against RSA and a suggested defense can be found in [2] and [3]. Adaptive chosen ciphertext attacks against NTRU have also been formulated and various countermeasures described, see [9] and [10]. Another type of attack called a reaction attack [6] can be used against some cryptosystems, including NTRU [8]. In a reaction attack, one can takes a ciphertext e and creates ciphertexts e1, e2, . . . such that for each ciphertext ei, there is a significant positive probability it will decrypt to the same plaintext as e and a significant positive probability it will decrypt to a different plaintext than e. Some specific reaction attacks against NTRU, again with assorted countermeasures, are given in [8] and [9]. In this report we describe two methods of Fujisaki and Okamoto [5] that can be used to defend NTRU against both adaptive chosen ciphertext attacks and reaction attacks. The basic idea is to use a hash of the plaintext (suitably padded) as the random component required in the encryption process. The decrypted plaintext is then checked by redoing the encryption. Since the plaintext reinserts itself into the encryption process, we have dubbed this the Fujisaki-Okamoto Self-Referential Technique (FOSRT). Although FOSRT, as applied to NTRU, has a small drawback in that it requires computation of one extra convolution product, NTRU remains extremely fast even with this extra computation. We also note that an alternative defense against chosen ciphertext and reaction attacks takes advantage of NTRU’s fast key creation to create transient (e.g., one-per-session) keys.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Note for Technical Report #007 Version 2. the Material on Oaep in This Report Has Been Superceded by Ntru Technical Report #016, " Protecting Ntru against Chosen Ciphertext and Reaction Attacks, " Available At

RSA and Bell Labs [2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem ...

متن کامل

Analysis and Improvements of NTRU Encryption Paddings

NTRU is an efficient patented public-key cryptosystem proposed in 1996 by Hoffstein, Pipher and Silverman. Although no devastating weakness of NTRU has been found, Jaulmes and Joux presented at Crypto ’00 a simple chosen-ciphertext attack against NTRU as originally described. This led Hoffstein and Silverman to propose three encryption padding schemes more or less based on previous work by Fuji...

متن کامل

New Chosen-Ciphertext Attacks on NTRU

We present new and efficient key-recovery chosen-ciphertext attacks on NTRUencrypt. Our attacks are somewhat intermediate between chosen-ciphertext attacks on NTRUencrypt previously published at CRYPTO ’00 and CRYPTO ’03. Namely, the attacks only work in the presence of decryption failures; we only submit valid ciphertexts to the decryption oracle, where the plaintexts are chosen uniformly at r...

متن کامل

Title: Plaintext Awareness and the Ntru Pkcs

RSA and Bell Labs 2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem t...

متن کامل

A Chosen-Ciphertext Attack against NTRU

We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of the polynomial mixing system with the independence of reduction modulo two relatively prime integers p and q. In this paper, we examine the effect of feeding special polynomials built from the public key to the decryp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000