期刊文献+

NTRU加密算法的一类弱密钥研究 被引量:1

Research on weak key of NTRU encryption scheme
下载PDF
导出
摘要 分析了NTRU公钥加密算法的一类弱密钥。根据NTRU所涉及的CS格与循环码的生成矩阵结构相似的特点,指出当NTRU的公钥与(xn-1)的最大公因式的次数大于零时,CS格的生成矩阵不可逆,此时可用类似于循环码译码的方法和格基归约算法破解NTRU。最后给出了能使NTRU避免生成此类弱密钥的方法。 This paper analyzed a class of weak keys of NTRU. According to the similarity between the structures of the CS lat- tice in NTRU and the generation matrix of cyclic code, when the degree of the greatest common divisor of NTRU public key and (xn - 1 ) was great than zero, generation matrix of CS lattice was not reversible and NTRU could be broken by the deco- ding technique of cyclic code and lattice reduction algorithm. Finally it proposed a method to protect NTRU against this flaw.
作者 牟宁波
出处 《计算机应用研究》 CSCD 北大核心 2014年第9期2784-2787,共4页 Application Research of Computers
关键词 NTRU 循环码译码 弱密钥 格基归约 NTRU cycle code decoding weak key lattice reduction
  • 相关文献

参考文献1

二级参考文献12

  • 1Ho//stein J, Pipher J, Silverman J H. NTRU.. A new high speed public key eryptosystem E J 1. Algorithmic Number Theory ( ANTS III), Portland, OR, June 1998,1423.
  • 2Ho//stein J, Pipher J, Silverman J H. NTRU: A ring-based pub- lie key eryptosystem [J]. Algorithmic Number Theory, 1998, 1423:267-288.
  • 3Perlner R A,Cooper D A. Quantum Resistant Public Key Cryp- tography:A Survey[C]//Proc. of IDtrust. 2009:85-93.
  • 4Coppersmith D, Shamlr A. Lattice attacks on NTRU [C]//Pro- ceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques. Konstanz, Germa- ny Springer-Verlag, 1997 : 52-61.
  • 5Jarvis K. NTRU over the Eisenstein Integers D]. Carleton U- niversity, 2011.
  • 6Ho//stein J, Silverman J H. Optimizations for NTRU [J]. Pub- lic-key Cryptography and Computational Number Theory, De- Gruyter, 2000.
  • 7Silverman J H. NTRU Report 014. Almost Inverses and Fast NTRU Key Creation[EB/OL3. http://www, ntru. corn, 1999.
  • 8Bini D, Corso G M D, Manzini G, et al. Inversion of circulant ma- trices over Zm[J]. Mathematics of Computation,2001,70(235) 1169-1182.
  • 9Geller D, Kra I, Popescu S, et al. On circulant matrices [M. Preprint, Stony Brook University.
  • 10Stinson D R. Cryptography: theory and practice [M. CRC Press, 2006.

共引文献2

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部