期刊文献+

NTRU公钥密码体制的等价密钥 被引量:3

Equivalent Keys in NTRU Public Key Cryptosystem
下载PDF
导出
摘要 NTRU公钥密码体制存在多个私钥对应同一个公钥的问题。首先分析了NTRU成功解密的条件,提出NTRU等价密钥的概念。然后给出了NTRU截尾多项式环上多项式可逆的充分必要条件和NTRU|.|∞半范数的相关性质,提出4种等价密钥的构造方法。最后分析了NTRU等价密钥对NTRU安全性的影响。分析表明,NTRU参数选择不当会导致一些特殊形式的等价密钥存在,严重威胁安全性。 NTRU public Key cryptosystem has the problem that multiple private keys correspond to a common pubic key. Firstly the condition of decryption was discussed, and the conception of equivalent keys in NTRU was proposed. Secondly the invertibility of polynomials in truncated polynomial ring and the |. |∞ semi-norm were discussed, and four schemes to construct equivalent keys were presented. Finally the security effect of equivalent keys was analyzed, which indicates that if NTRU parameters are not chosen properly, some special equivalent keys will pose a serious security threat to NTRU.
出处 《计算机科学》 CSCD 北大核心 2012年第7期78-81,共4页 Computer Science
关键词 NTRU公钥密码体制 截尾多项式环 可逆多项式 半范数 等价密钥 NTRU public key cryptosystem, Truncated polynomial ring, Invertible polynomial, Sembnorm, Equivalent keys
  • 相关文献

参考文献12

  • 1Ho//stein J, Pipher J, Silverman J H. NTRU.. A new high speed public key eryptosystem E J 1. Algorithmic Number Theory ( ANTS III), Portland, OR, June 1998,1423.
  • 2Ho//stein J, Pipher J, Silverman J H. NTRU: A ring-based pub- lie key eryptosystem [J]. Algorithmic Number Theory, 1998, 1423:267-288.
  • 3Perlner R A,Cooper D A. Quantum Resistant Public Key Cryp- tography:A Survey[C]//Proc. of IDtrust. 2009:85-93.
  • 4Coppersmith D, Shamlr A. Lattice attacks on NTRU [C]//Pro- ceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques. Konstanz, Germa- ny Springer-Verlag, 1997 : 52-61.
  • 5Jarvis K. NTRU over the Eisenstein Integers D]. Carleton U- niversity, 2011.
  • 6Ho//stein J, Silverman J H. Optimizations for NTRU [J]. Pub- lic-key Cryptography and Computational Number Theory, De- Gruyter, 2000.
  • 7Silverman J H. NTRU Report 014. Almost Inverses and Fast NTRU Key Creation[EB/OL3. http://www, ntru. corn, 1999.
  • 8Bini D, Corso G M D, Manzini G, et al. Inversion of circulant ma- trices over Zm[J]. Mathematics of Computation,2001,70(235) 1169-1182.
  • 9Geller D, Kra I, Popescu S, et al. On circulant matrices [M. Preprint, Stony Brook University.
  • 10Stinson D R. Cryptography: theory and practice [M. CRC Press, 2006.

同被引文献9

  • 1XIA K,WU Y,REN X,et al.Research in Clustering Algorithm for Diseases Analysis[J].Journal of Networks,2013,8(7):1632-1639.
  • 2YING-CHANG LIANG,KWANG-CHENG CHEN,GEOFFREY YE LI,et al.Cognitive radio networking and communications:An overview[J].IEEE Transactions On Vehicular Technology,2011,60(7):3386-3407.
  • 3IAN F,AKVILDIZ,BRANDON F,et al.Cooperative spectrum sensing in cognitive radio networks:A survey[J].Physical Communication,2011,4(1):40–62.
  • 4Ding JT, Pan YB, Deng YP. An Algebraic Broadcast Attackagainst NTRU: Information Security and Privacy ,2012[C]//Berlin: Springer, 2012: 124-137.
  • 5Nick HG, Phong N, David P, et al. The Impact of Decryp-tion Failures on the Security of NTRU Encryption: Advanc-es in Cryptology - CRYPTO 2003[C]//Berlin: Springer2003:226-246.
  • 6Nicolas G,Phong N. New Chosen- Ciphertext Attacks onNTRU: Public Key Cryptography – PKC 2007[C]// Ber-lin : Springer, 2007: 89-106.
  • 7Nick HG, Joseph S, William W. Choosing Parameter Setsfor NTRUEncrypt with NAEP and SVES-3: Topics in Cryp-tology – CT-RSA 2005[C]//. Berlin: Springer,2005: 118-135.
  • 8赵国锋,喻守成,文晟.基于用户行为分析的应用层DDoS攻击检测方法[J].计算机应用研究,2011,28(2):717-719. 被引量:25
  • 9刘静.基于RSA公钥加密算法的电子邮件加密程序之JAVA实现[J].科技通报,2012,28(2):84-86. 被引量:9

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部