Knapsack Cryptosystems and Unreliable Reliance on Density

被引:3
作者
Jen, Shang-Ming [1 ]
Lai, Tse-Lin [1 ]
Lu, Chia-Yu [1 ]
Yang, Jar-Ferr [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Elect Engn, Tainan 70101, Taiwan
来源
2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2012年
关键词
Knapsack cryptoststems; subset sum problems; density; lattice reduction; lattice attacks; ALGORITHMS; SIGNATURES; ATTACKS;
D O I
10.1109/AINA.2012.43
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
With the possible advent of quantum computers, the most famous public key cryptosystem for network applications - RSA, is facing critical challenges in the near future. A replacement might be knapsack cryptosystems, which do not yield any benefits to quantum computation. Before making knapsack cryptosystems suitable for applications, it is necessary to guarantee their security. At present, the most significant challenge towards knapsack cryptosystems is lattice attacks. Public key density has historically been used to measure the security of the knapsack cryptosystems against these lattice attacks. However, an acceptably dense knapsack cryptosystem was broken using lattice attack implementation in our research. In order to study the security of knapsack cryptosystems against lattice attacks, we design a series of experiments to analyze these factors. We conclude it is not appropriate to assess knapsack cryptosystem security by simply considering density. From our results, we provide suggested directions for knapsack cryptosystem developers.
引用
收藏
页码:748 / 754
页数:7
相关论文
共 19 条
[1]
[Anonymous], P 15 ACM S THEOR COM
[2]
[Anonymous], LNCS
[3]
Brickell E. F., 1985, P CRYPT 84, P342
[4]
BRICKELL EF, 1984, P CRYPTO 83, P25
[5]
Coster MJ, 1992, COMPUT COMPLEX, V2, P111
[6]
NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]
Low-density attack revisited [J].
Izu, Tetsuya ;
Kogure, Jun ;
Koshiba, Takeshi ;
Shimoyama, Takeshi .
DESIGNS CODES AND CRYPTOGRAPHY, 2007, 43 (01) :47-59
[8]
Kunihiro N, 2008, LECT NOTES COMPUT SC, V5023, P156
[9]
LAGARIAS JC, 1983, P 24 IEEE S FDN COMP, P1
[10]
Laih C. S., 1989, IEEE J SELECTED AREA, V7