期刊文献+

模背包向量问题的实际复杂度与基于格密码体制的实际安全性 被引量:2

Actual Complexity of Modular Knapsack Vector Problem and Practical Security of a Lattice Based Public Key Cryptosystem
下载PDF
导出
摘要 背包问题常被用来构造公钥密码算法,它是公钥密码学中的一个研究热点,模背包向量问题是同时求解若干个在模意义下的背包问题.本文将模背包向量问题转化为格中短向量的求解.我们利用LLL、BKZ等格基约化算法或它们的联合方法求解目标向量,实际地解决了维数较小时的模背包向量问题,讨论了关于模背包向量问题的安全标准,并展示了由模背包向量问题引出的格的Hermite因子随维数的变化关系.我们的实验结果,一方面验证了我们的理论分析,成功地在格维数较小时求解出了目标向量,即模背包向量问题在维数较小时可解;另一方面,由目标向量在维数较大的格中未被找到可以看出,格基约化算法在求解格中短向量问题的计算能力受维数的限制.随着格维数的变大,格基约化算法的运行时间指数级增长并且找到目标向量的概率减小.另外,我们通过具体的实验数据,验证并说明了格基约化算法中参数选取对实验结果产生的影响.对于CANS 2011会议上提出的一个基于格与背包问题混合设计的公钥加密方案,我们将针对该方案的唯密文攻击转化为模背包向量问题的求解,从而在唯密文攻击下实际地攻破了该方案的一个推荐参数m=100. Knapsack problem is usually utilized to design asymmetric cryptographic algorithms, and it is a research hotspot of public key cryptography, the modular knapsack vector problem is the problem of solving several knapsack problems simultaneously in the sense of modulo operation. In this paper, this problem is converted into finding short vectors in some lattices. We show that the modular knapsack vector problem can be practically solved for small dimensions by using the LLL or BKZ algorithm or their combination, and discuss the security standard of the modular knapsack vector problem and show the relationship between the Hermite factor and the dimensions of the lattices which are derived from the modular knapsack vector problem. Our experiments coincide with the theoretical analysis and can solve the target vector for small dimensions, namely the modular knapsack vector problem can be solved for small dimensions. On the other hand, due to the failure to find target vectors in lattices with large dimensions, we can see that the computation capability of lattice basis reduction algorithms is restricted by the dimensions of lattices. When the dimension increases, the running time of lattice basis reduction algorithm increases exponentially and the probability of success for finding out the target vector decreases. Furthermore, based on the experiments, we verified and showed that the choices of parameters of algorithms also affect the experimental results. For a lattice-knapsack mixed public key cryptosystem proposed at the CANS 2011 conference, when converted into modular knapsack vector problem, we can practically break the cryptosystem under ciphertext-only attack for one of its recommended parameters m =100.
出处 《密码学报》 2014年第3期225-234,共10页 Journal of Cryptologic Research
基金 国家重点基础研究发展计划(973计划)(2013CB834203) 国家自然科学基金项目(61070172) 中国科学院战略性先导科技专项(XDA06010702)
关键词 模背包向量问题 格基约化算法 唯密文攻击 实际安全性 modular knapsack vector problem lattice basis reduction ciphertext-only attack practical security
  • 相关文献

参考文献5

  • 1WIEB BOSMA,JOHN CANNON,CATHERINE PLAYOUST.The Magma Algebra System I: The User Language[J].Journal of Symbolic Computation.1997(3)
  • 2C. P. Schnorr,M. Euchner.Lattice basis reduction: Improved practical algorithms and solving subset sum problems[J].Mathematical Programming (-).1994(1-3)
  • 3Matthijs J. Coster,Antoine Joux,Brian A. LaMacchia,Andrew M. Odlyzko,Claus-Peter Schnorr,Jacques Stern.Improved low-density subset sum algorithms[J].Computational Complexity.1992(2)
  • 4J. C. Lagarias,A. M. Odlyzko.Solving low-density subset sum problems[J].Journal of the ACM (JACM).1985(1)
  • 5A. K. Lenstra,H. W. Lenstra,L. Lovász.Factoring polynomials with rational coefficients[J].Mathematische Annalen.1982(4)

共引文献1

同被引文献22

  • 1Srinivasan Krishnaswamy,Harish K. Pillai.On the number of special feedback configurations in linear modular systems[J].Systems & Control Letters.2013
  • 2Claude-Pierre Jeannerod,Clément Pernet,Arne Storjohann.Rank-profile revealing Gaussian elimination and the CUP matrix decomposition[J].Journal of Symbolic Computation.2013
  • 3Lize Gu,Licheng Wang,Kaoru Ota,Mianxiong Dong,Zhenfu Cao,Yixian Yang.New public key cryptosystems based on non‐Abelian factorization problems[J].Security Comm Networks.2013(7)
  • 4D. J. Jeffrey.LU factoring of non-invertible matrices[J].ACM Communications in Computer Algebra (/).2010(1/2)
  • 5Andrius Raulynaitis,Eligijus Sakalauskas,Saulius Japertas.Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem[J].Informatica.2010(2)
  • 6Wenqin Zhou,David J. Jeffrey.Fraction-free matrix factors: new forms for LU and QR factors[J].Frontiers of Computer Science in China.2008(1)
  • 7Eligijus Sakalauskas,Povilas Tvarijonas,Andrius Raulynaitis.Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level[J].Informatica.2007(1)
  • 8王礼广,蔡放,熊岳山.五对角线性方程组追赶法[J].南华大学学报(自然科学版),2008,22(1):1-4. 被引量:14
  • 9梅挺,代群,张明.McEliece公钥密码体制中问题的分析研究[J].计算机工程与设计,2008,29(7):1658-1659. 被引量:2
  • 10曹淑贞.剩余类环上线性方程组的求解[J].淮北煤炭师范学院学报(自然科学版),2009,30(2):1-5. 被引量:3

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部