期刊文献+

一类用于攻击NTRU的新格 被引量:1

New Lattice to Attack NTRU
下载PDF
导出
摘要 NTRU算法是一个新的公钥密码算法,其安全性取决于从一个非常大的维数格中寻找最短向量的困难性.作者研究了NTRU算法的安全性,使用格约化方法对NTRU算法进行攻击.并找到了一类特殊的格,由于利用了NTRU私钥的特殊结构,该格的维(dimension)比常用的格更小.研究表明,具有某种特征的NTRU密钥特别容易被攻击,但是本文的方法可以用于攻击所有的NTRU密钥.该研究不会影响NTRU的应用,只是对NTRU格参数的选取有了更加严格的限制条件.从安全性和有效性综合考虑,NTRU公钥密码体制有着广阔的应用前景. NTRU is a new Public Key Cryptography.The security of it is based on the hard problem of finding a very short vector in a lattice of very high dimension.Authors studied the security of NTRU and used lattice reduction to attack it.A new special lattice was found.For the special architecture of the private key of NTRU,the dimension of the lattice is less than usual lattice.Although certain private keys of NTRU with some characteristic are easily attacked,the method can be used to attack all keys of NTRU.This research lets the lattice parameter have some constraints,but it doesn’t affect the application of NTRU public key cryptography.The NTRU is used widely for their security and efficiency
作者 肖烨 卢伟清
出处 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第B06期229-232,共4页 Journal of Xiamen University:Natural Science
  • 相关文献

参考文献5

  • 1Lenstra A K,Lenstra H W,Lovasz L.Factoring polynomials with integer coefficients[J].Mathematische Annalen,1982,261:513-514.
  • 2Schnorr C P.A hierarchy of polynomial time lattice basisi reduction algorithms[J].Theoretical Computer Science,1987,53:201-224.
  • 3Schnorr C P.Block reduced lattice basisi and successive minima[J].Combinatorics,Probability and Computing,1994,3:507-522.
  • 4步山岳.NTRU公开密钥体制算法分析与实现[J].计算机工程,2002,28(6):111-113. 被引量:10
  • 5步山岳,徐新亚,姚清海.NTRU公开密钥体制安全性分析[J].计算机工程与应用,2002,38(24):180-181. 被引量:8

二级参考文献8

  • 1刘衍衍.计算机安全技术[M].长春:吉林科学技术出版社,1997..
  • 2J Hoffstcin,J Pilpher,J H Silverman. A Ring-Based Public key Cryptosyste.available at www.ntru.com
  • 3NTRU Cryptosystems Technical Report #013[R].available at www.ntru.com
  • 4NTRU Cryptosystems Technical Report #015[R].available at www.ntru.com
  • 5O Goldreich ,S Goldwasser,S Halvei. Public-key cryptography from lattice reduction problems[C].In:proc CRYPTO'97,Lect Notes in computer Science 1294,Springer-Verlag, 1997
  • 6H Cohen. A Course in Computational Algebraic Number Theory,Graduate Texts in Math[M].Springer verlag,Berlin, 1993; 138
  • 7刘衍衍等编著.计算机安全技术[M].吉林科学技术出版社,1997
  • 8冯晖等编著.计算机密码学[M].中国铁道出版社

共引文献12

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部