Current Attacks on NTRU
نویسنده
چکیده
Acknowledgements I should thank many people who have helped me on the way of writing and then righting what you read now. I start with my family, whose love and support have been the very foundation of all my studies. I thank Professor Buchmann, who interested me in the field of lattice cryptography and arranged this thesis. I thank my first supervisor Christoph Ludwig, for many talks about lattice-reduction and programming even from afar. And I especially thank my most thorough supervisor and guide through the worlds of computer science and mathematics, Ulrich Vollmer. As a nice counterpoint, I thank Stefanie Stuckenholz my sweet love, for ensuring that I never spent too much time working. On the same note, I thank my longest and bestest friend Frank Karinda, for giving me the ambition to try for a doctoral thesis next. I thank Rafaël Dahmen for every single tomato-wheat-talk. And last but in no way least, I thank all my other proofreaders Ben, Burgi, and Nicole, who in their different fields of expertise are the most sympathetic geniuses I know. And I thank Ben once more for countless hours of help during the climax of this work. May none of you ever lack for a beverage. Warranty I hereby warrant that the content of this thesis is the direct result of my own work and that any use made in it of published or unpublished material is fully and correctly referenced.
منابع مشابه
Imperfect Decryption and an Attack on the NTRU Encryption Scheme
A property of the NTRU public-key cryptosystem is that it does not provide perfect decryption. That is, given an instance of the cryptosystem, there exist ciphertexts which can be validly created using the public key but which can’t be decrypted using the private key. The valid ciphertexts which an NTRU secret key will not correctly decipher determine, up to a cyclic shift, the secret key. In t...
متن کاملComparison between Subfield and Straightforward Attacks on NTRU
Recently in two independent papers, Albrecht, Bai and Ducas and Cheon, Jeong and Lee presented two very similar attacks, that allow to break NTRU with larger parameters and GGH Multinear Map without zero encodings. They proposed an algorithm for recovering the NTRU secret key given the public key which apply for large NTRU modulus, in particular to Fully Homomorphic Encryption schemes based on ...
متن کاملTitle: Plaintext Awareness and the Ntru Pkcs
RSA and Bell Labs 2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem t...
متن کاملNtru: a Public Key Cryptosystem
0. Introduction 1. Description of NTRU 1.1. Notation 1.2. Key Creation 1.3. Encryption 1.4. Decryption 1.5. Why Decryption Works 1.6. Parameter choices notation and a norm estimate 1.7. Sample spaces 1.8. A Decryption Criterion 2. Attributes and Advantages of NTRU 2.1. Theoretical Operating Speci cations 2.2. Comparison With Other PKCS's 3. Security Considerations 3.1. Security Analysis 3.2. Br...
متن کاملNote for Technical Report #007 Version 2. the Material on Oaep in This Report Has Been Superceded by Ntru Technical Report #016, " Protecting Ntru against Chosen Ciphertext and Reaction Attacks, " Available At
RSA and Bell Labs [2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem ...
متن کاملNTRU Cryptosystems Technical Report
In this note we describe, extend, and analyze the lattice construction ideas of Alexander May 1] as they apply to the NTRU public key cryptosystem. We use both theoretical and experimental methods to analyze the strength of the attacks. The nal conclusion is that the new attacks only marginally aaect the security levels of the standard commercial NTRU parameter sets (N = 167, 263, and 503), but...
متن کامل