Note for Technical Report #007 Version 2. the Material on Oaep in This Report Has Been Superceded by Ntru Technical Report #016, " Protecting Ntru against Chosen Ciphertext and Reaction Attacks, " Available At

نویسنده

  • Joseph H. Silverman
چکیده

RSA and Bell Labs [2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem to various sorts of attacks. In this note we describe some potential attacks on the NTRU Public Key Cryptosystem (PKC) analogous to the attack described in [2, 3] and suggest the use of an OAEP digital envelope to eliminate the threat of such attacks. Note for Technical Report #007 Version 2. The material on OAEP in this report has been superceded by NTRU Technical Report #016, “Protecting NTRU Against Chosen Ciphertext and Reaction Attacks,” available at www.ntru.com. The report #016 describes a padding technique of Fujisaki and Okamoto that protects against chosen ciphertext attacks (CCA) and other attacks described in this note, against the reaction attacks described in NTRU Technical Note #015, and against the CCA described in “A chosen-ciphertext attack against NTRU,” E. Jaulmes and A. Joux, Proceedings of CRYPTO 2000, Lecture Notes in Computer Science, Springer-Verlag. A cryptosystem is said to be plaintext aware if it is infeasible for an attacker to construct a valid ciphertext without knowing the corresponding plaintext. (For a more precise definition of this concept, see [4].) Failure to be plaintext aware may open the door to various sorts of attacks, such as Bleichenbacher’s Adaptive Chosen Ciphertext Attack [2, 3] on RSA’s Public Key Cryptography Standard #1 (PKCS #1). In this note we will construct several attacks on the NTRU Public Key Cryptosystem, including an adaptive chosen ciphertext attack similar to [2]. A number of countermeasures to Bleichenbacher-type attacks are described in [3], including: • Frequent changes of key pair. • Check messages more rigorously for format after decryption. • Require the sender to demonstrate knowledge of the data before indicating whether the decryption was successful.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting NTRU Against Chosen Ciphertext and Reaction Attacks

This report describes how the Fujisaki-Okamoto SelfReferential Technique (FOSRT) can be used to make the NTRU Public Key Cryptosystem resistant to adaptive chosen ciphertext attacks and to reaction attacks. Many asymmetric ciphers are susceptible to (adaptive) chosen ciphertext attacks. An attacker sends a series of purported ciphertexts e1, e2, . . . and uses the decryptions to deduce informat...

متن کامل

Title: Plaintext Awareness and the Ntru Pkcs

RSA and Bell Labs 2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem t...

متن کامل

A Chosen-Ciphertext Attack against NTRU

We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of the polynomial mixing system with the independence of reduction modulo two relatively prime integers p and q. In this paper, we examine the effect of feeding special polynomials built from the public key to the decryp...

متن کامل

Analysis and Improvements of NTRU Encryption Paddings

NTRU is an efficient patented public-key cryptosystem proposed in 1996 by Hoffstein, Pipher and Silverman. Although no devastating weakness of NTRU has been found, Jaulmes and Joux presented at Crypto ’00 a simple chosen-ciphertext attack against NTRU as originally described. This led Hoffstein and Silverman to propose three encryption padding schemes more or less based on previous work by Fuji...

متن کامل

NTRU Cryptosystems Technical Report

In this note we describe, extend, and analyze the lattice construction ideas of Alexander May 1] as they apply to the NTRU public key cryptosystem. We use both theoretical and experimental methods to analyze the strength of the attacks. The nal conclusion is that the new attacks only marginally aaect the security levels of the standard commercial NTRU parameter sets (N = 167, 263, and 503), but...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998