A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem

Jintai Ding Joshua Deaton Kurt Schmidt Vishakha Zheng Zhang

TBD mathscidoc:2207.43124

IACR Cryptol. ePrint Arch., 2020.6
In 1998, Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman introduced the famous NTRU cryptosystem, and called it "A ring-based public key cryptosystem". Actually, it turns out to be a lattice based cryptosystem that is resistant to Shor's algorithm. There are several modifications to the original NTRU and two of them are selected as round 2 candidates of NIST post quantum public key scheme standardization. In this paper, we present a simple attack on the original NTRU scheme. The idea comes from Ding et al.'s key mismatch attack. Essentially, an adversary can find information on the private key of a KEM by not encrypting a message as intended but in a manner which will cause a failure in decryption if the private key is in a certain form. In the present, NTRU has the encrypter generating a random polynomial with "small" coefficients, but we will have the coefficients be "large". After this, some further work will create an equivalent key.
No keywords uploaded!
[ Download ] [ 2022-07-22 17:19:06 uploaded by dingjt ] [ 372 downloads ] [ 0 comments ]
@inproceedings{jintai2020a,
  title={A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem},
  author={Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, and Zheng Zhang},
  url={http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220722171906939186708},
  booktitle={IACR Cryptol. ePrint Arch.},
  year={2020},
}
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, and Zheng Zhang. A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem. 2020. In IACR Cryptol. ePrint Arch.. http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220722171906939186708.
Please log in for comment!
 
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved