Skip to main content

Key Recovery Attacks on NTRU without Ciphertext Validation Routine

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2727))

Included in the following conference series:

Abstract

NTRU is an efficient public-key cryptosystem proposed by Hoffstein, Pipher, and Silverman. Assuming access to a decryption oracle, we show ways to recover the private key of NTRU systems that do not include a ciphertext validating procedure. The strongest of our methods will employ just a single call to the oracle, and in all cases, the number of calls needed will be small enough to be realistic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Consortium for Efficient Embedded Security, Efficient embedded security standards #1: Implementation aspects of NTRUEncrypt and NTRUSign. Draft version 5. Available from http://www.ceesstandards.org.

    Google Scholar 

  2. Daewan Han, Jin Hong, Jae Woo Han, and Daesung Kwon, Key recovery attacks on NTRU without ciphertext validation routine. IACR ePrint 2002/188. Available from http://eprint.iacr.org.

    Google Scholar 

  3. Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman, NTRU: A ring-based public key cryptosystem. In Proc. of ANTS III, LNCS 1423. Springer-Verlag, 1998.

    Google Scholar 

  4. Jeffrey Hoffstein and Joseph Silverman, Optimizations for NTRU. In Public-Key Cryptogrphy and Computational Number Theory. DeGruyter, 2002. Available from [10].

    Google Scholar 

  5. Jeffrey Hoffstein and Joseph H. Silverman, Reaction attacks against the NTRU public key cryptosystem. Techinal report #015, NTRU Cryptosystems. Available from [10].

    Google Scholar 

  6. Jeffrey Hoffstein and Joseph H. Silverman, Protecting NTRU Against Chosen Ciphertext and Reaction Attacks, Technical Report #016, NTRU Cryptosystems. Available from [10].

    Google Scholar 

  7. IEEE Standard P1363.1/D4, Standard specifications for public key cryptography: Techniques based on hard problems over lattices, IEEE. Available from http://grouper.ieee.org/group/1363.

    Google Scholar 

  8. Éliane Jaulmes and Antoine Joux, A chosen-ciphertext attack against NTRU. Advances in Cryptology — CRYPTO 2000, LNCS 1880. Springer-Verlag, 2000.

    Chapter  Google Scholar 

  9. Phong Q. Nguyen and David Pointcheval, Analysis and improvements of NTRU encryption paddings. Advances in Cryptology — CRYPTO 2002, LNCS 2442. Springer-Verlag, 2002.

    Chapter  Google Scholar 

  10. NTRU Cryptosystems, Technical reports. Available from http://www.ntru.com.

    Google Scholar 

  11. NTRU Cryptosystems, The NTRU public key cryptosystem — A tutorial. Available from http://www.ntru.com.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, D., Hong, J., Han, J.W., Kwon, D. (2003). Key Recovery Attacks on NTRU without Ciphertext Validation Routine. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_24

Download citation

  • DOI: https://doi.org/10.1007/3-540-45067-X_24

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40515-3

  • Online ISBN: 978-3-540-45067-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics