Factoring pq2 with Quadratic Forms: Nice Cryptanalyses

نویسندگان

  • Guilhem Castagnos
  • Antoine Joux
  • Fabien Laguillaumie
  • Phong Q. Nguyen
چکیده

We present a new algorithm based on binary quadratic forms to factor integers of the form N = pq. Its heuristic running time is exponential in the general case, but becomes polynomial when special (arithmetic) hints are available, which is exactly the case for the so-called NICE family of public-key cryptosystems based on quadratic fields introduced in the late 90s. Such cryptosystems come in two flavours, depending on whether the quadratic field is imaginary or real. Our factoring algorithm yields a general key-recovery polynomial-time attack on NICE, which works for both versions: Castagnos and Laguillaumie recently obtained a total break of imaginary-NICE, but their attack could not apply to real-NICE. Our algorithm is rather different from classical factoring algorithms: it combines Lagrange’s reduction of quadratic forms with a provable variant of Coppersmith’s lattice-based root finding algorithm for homogeneous polynomials. It is very efficient given either of the following arithmetic hints: the public key of imaginary-NICE, which provides an alternative to the CL attack; or the knowledge that the regulator of the quadratic field Q(√p) is unusually small, just like in real-NICE.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Factoring pq with Quadratic Forms: Nice Cryptanalyses

We present a new algorithm based on binary quadratic forms to factor integers of the form N = pq. Its heuristic running time is exponential in the general case, but becomes polynomial when special (arithmetic) hints are available, which is exactly the case for the so-called NICE family of public-key cryptosystems based on quadratic fields introduced in the late 90s. Such cryptosystems come in t...

متن کامل

A NICE Cryptanalysis

We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More precisely, the systems make use of the canonical surjection between the class group of the quadratic order of discriminant p −pq2 and the class group of the quadratic order of discriminant √−p. In this paper, we examine...

متن کامل

Smallest Reduction Matrix of Binary Quadratic Forms And Cryptographic Applications

We present a variant of the Lagrange-Gauss reduction of quadratic forms designed to minimize the norm of the reduction matrix within a quadratic complexity. The matrix computed by our algorithm on the input f has norm O f 1 2 Δ 4 f , which is the square root of the best previously known bounds using classical algorithms. This new bound allows us to fully prove the heuristic lattice based attack...

متن کامل

An Adaptation of the NICE Cryptosystem to Real Quadratic Orders

Security of electronic data has become indispensable to today’s global information society, and public-key cryptography, a key element to securing internet communication, has gained increasing interest as a vital subject of research. Numerous public-key cryptosystems have been proposed that use allegedly intractable number theoretic problems as a basis of their security. One example is NICE, in...

متن کامل

Applications of quadratic D-forms to generalized quadratic forms

In this paper, we study generalized quadratic forms over a division algebra with involution of the first kind in characteristic two. For this, we associate to every generalized quadratic from a quadratic form on its underlying vector space. It is shown that this form determines the isotropy behavior and the isometry class of generalized quadratic forms.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009