2016
DOI: 10.1112/s1461157016000206
|View full text |Cite
|
Sign up to set email alerts
|

Reduced memory meet-in-the-middle attack against the NTRU private key

Abstract: NTRU is a public-key cryptosystem introduced at ANTS-III. The two most used techniques in attacking the NTRU private key are meet-in-the-middle attacks and lattice-basis reduction attacks. Howgrave-Graham combined both techniques in 2007 and pointed out that the largest obstacle to attacks is the memory capacity that is required for the meet-in-the-middle phase. In the present paper an algorithm is presented that applies low-memory techniques to find 'golden' collisions to Odlyzko's meet-in-the-middle attack a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…We thus estimate the attack cost as Lpt. The storage requirement of the attack is approximately L log 2 L. We can reduce this storage by applying collision search to the meet-in-the-middle attack (see [92,116]). In this case we can reduce the storage capacity by a factor s at the expense of increasing the running time by a factor √ s.…”
Section: Meet-in-the-middle Attackmentioning
confidence: 99%
“…We thus estimate the attack cost as Lpt. The storage requirement of the attack is approximately L log 2 L. We can reduce this storage by applying collision search to the meet-in-the-middle attack (see [92,116]). In this case we can reduce the storage capacity by a factor s at the expense of increasing the running time by a factor √ s.…”
Section: Meet-in-the-middle Attackmentioning
confidence: 99%
“…The NTRU algorithm [14][15][16] is an open secret system invented by three professors of mathematics at Brown University in 1996. It is a cryptosystem based on polynomial rings, and its security depends on the shortest vector problem (SVP).…”
Section: Description Of the Ntru Algorithmmentioning
confidence: 99%
“…By using nonce and limiteduse session keys, the proposed system scheme can prevent replay attack [16] as the session keys used in this scheme are used only once.…”
Section: Replay Attack Preventionmentioning
confidence: 99%
“…A paper ‘A hybrid lattice‐reduction and meet in the middle attack against NTRU’ in CRYPTO 2007 was given as combination of both ways. In 2016, C. V. Vredendaal pointed out that the largest drawback to mount the meet in the middle attack is the memory capacity that is required for this. An algorithm is presented that uses low‐memory techniques to find collisions to meet in the middle attack given by Odlyzko against the NTRU private key.…”
Section: Ntru Cryptosystem ‐ Nth Degree Truncated Polynomial Ring Unitmentioning
confidence: 99%