Factoring pq2 with Quadratic Forms: Nice Cryptanalyses
نویسندگان
چکیده
We present a new algorithm based on binary quadratic forms to factor integers of the form N = pq. Its heuristic running time is exponential in the general case, but becomes polynomial when special (arithmetic) hints are available, which is exactly the case for the so-called NICE family of public-key cryptosystems based on quadratic fields introduced in the late 90s. Such cryptosystems come in two flavours, depending on whether the quadratic field is imaginary or real. Our factoring algorithm yields a general key-recovery polynomial-time attack on NICE, which works for both versions: Castagnos and Laguillaumie recently obtained a total break of imaginary-NICE, but their attack could not apply to real-NICE. Our algorithm is rather different from classical factoring algorithms: it combines Lagrange’s reduction of quadratic forms with a provable variant of Coppersmith’s lattice-based root finding algorithm for homogeneous polynomials. It is very efficient given either of the following arithmetic hints: the public key of imaginary-NICE, which provides an alternative to the CL attack; or the knowledge that the regulator of the quadratic field Q(√p) is unusually small, just like in real-NICE.
منابع مشابه
Factoring pq with Quadratic Forms: Nice Cryptanalyses
We present a new algorithm based on binary quadratic forms to factor integers of the form N = pq. Its heuristic running time is exponential in the general case, but becomes polynomial when special (arithmetic) hints are available, which is exactly the case for the so-called NICE family of public-key cryptosystems based on quadratic fields introduced in the late 90s. Such cryptosystems come in t...
متن کاملA NICE Cryptanalysis
We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More precisely, the systems make use of the canonical surjection between the class group of the quadratic order of discriminant p −pq2 and the class group of the quadratic order of discriminant √−p. In this paper, we examine...
متن کاملSmallest Reduction Matrix of Binary Quadratic Forms And Cryptographic Applications
We present a variant of the Lagrange-Gauss reduction of quadratic forms designed to minimize the norm of the reduction matrix within a quadratic complexity. The matrix computed by our algorithm on the input f has norm O f 1 2 Δ 4 f , which is the square root of the best previously known bounds using classical algorithms. This new bound allows us to fully prove the heuristic lattice based attack...
متن کاملAn Adaptation of the NICE Cryptosystem to Real Quadratic Orders
Security of electronic data has become indispensable to today’s global information society, and public-key cryptography, a key element to securing internet communication, has gained increasing interest as a vital subject of research. Numerous public-key cryptosystems have been proposed that use allegedly intractable number theoretic problems as a basis of their security. One example is NICE, in...
متن کاملApplications of quadratic D-forms to generalized quadratic forms
In this paper, we study generalized quadratic forms over a division algebra with involution of the first kind in characteristic two. For this, we associate to every generalized quadratic from a quadratic form on its underlying vector space. It is shown that this form determines the isotropy behavior and the isometry class of generalized quadratic forms.
متن کامل