Abstract
NTRU is an efficient public-key cryptosystem proposed by Hoffstein, Pipher, and Silverman. Assuming access to a decryption oracle, we show ways to recover the private key of NTRU systems that do not include a ciphertext validating procedure. The strongest of our methods will employ just a single call to the oracle, and in all cases, the number of calls needed will be small enough to be realistic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Consortium for Efficient Embedded Security, Efficient embedded security standards #1: Implementation aspects of NTRUEncrypt and NTRUSign. Draft version 5. Available from http://www.ceesstandards.org.
Daewan Han, Jin Hong, Jae Woo Han, and Daesung Kwon, Key recovery attacks on NTRU without ciphertext validation routine. IACR ePrint 2002/188. Available from http://eprint.iacr.org.
Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman, NTRU: A ring-based public key cryptosystem. In Proc. of ANTS III, LNCS 1423. Springer-Verlag, 1998.
Jeffrey Hoffstein and Joseph Silverman, Optimizations for NTRU. In Public-Key Cryptogrphy and Computational Number Theory. DeGruyter, 2002. Available from [10].
Jeffrey Hoffstein and Joseph H. Silverman, Reaction attacks against the NTRU public key cryptosystem. Techinal report #015, NTRU Cryptosystems. Available from [10].
Jeffrey Hoffstein and Joseph H. Silverman, Protecting NTRU Against Chosen Ciphertext and Reaction Attacks, Technical Report #016, NTRU Cryptosystems. Available from [10].
IEEE Standard P1363.1/D4, Standard specifications for public key cryptography: Techniques based on hard problems over lattices, IEEE. Available from http://grouper.ieee.org/group/1363.
Éliane Jaulmes and Antoine Joux, A chosen-ciphertext attack against NTRU. Advances in Cryptology — CRYPTO 2000, LNCS 1880. Springer-Verlag, 2000.
Phong Q. Nguyen and David Pointcheval, Analysis and improvements of NTRU encryption paddings. Advances in Cryptology — CRYPTO 2002, LNCS 2442. Springer-Verlag, 2002.
NTRU Cryptosystems, Technical reports. Available from http://www.ntru.com.
NTRU Cryptosystems, The NTRU public key cryptosystem — A tutorial. Available from http://www.ntru.com.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, D., Hong, J., Han, J.W., Kwon, D. (2003). Key Recovery Attacks on NTRU without Ciphertext Validation Routine. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_24
Download citation
DOI: https://doi.org/10.1007/3-540-45067-X_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40515-3
Online ISBN: 978-3-540-45067-2
eBook Packages: Springer Book Archive