首页> 外文会议>International Conference on Information Security >Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU
【24h】

Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU

机译:选择子场格子攻击的参数,反对过度拉伸NTRU

获取原文

摘要

Albrecht et al. [1] at Crypto 2016 and Cheon et al. [4] at ANTS 2016 independently presented a subfield attack on overstretched NTRU problem. Their idea is to map the public key down to the subfield (by norm and trace map respectively) and hence obtain a lattice of smaller dimension for which a lattice reduction algorithm is efficiently applicable. At Eurocrypt 2017, Kirchner and Fouque proposed another variant attack which exploits the presence of orthogonal bases within the cyclotomic number rings and instead of using the matrix of the public key in the subfield, they use the multiplication matrix by the public key in the full field and apply a lattice reduction algorithm to a suitable projected lattice of smaller dimension. They also showed a tight estimation of the parameters broken by lattice reduction and implementation results that their attack is better than the subfield attack. In this paper, we exploit technical results from Kirchner and Fouque [12] for the relative norm of field elements in the subfield and we use Hermite factor for estimating the output of a lattice basis reduction algorithm in order to analyze general choice of parameters for the subfield attack by Albrecht et al. [1]. As a result, we obtain the estimation for better choices of the subfields for which the attack works with smaller modulus. Our experiment results show that we can attack overstretched NTRU with modulus smaller than that of Albrecht et al. and of Kirchner and Fouque.
机译:Albrecht等人。 [1]在Crypto 2016和Cheon等人。 [4]在蚂蚁2016上独立地展示了关于过度拉伸的NTRU问题的子场攻击。他们的想法是将公钥映射到子场(分别通过规范和跟踪地图),因此获得晶格减少算法有效适用的较小尺寸的晶格。在Eurocrypt 2017中,Kirchner和Fouque提出了另一个变体攻击,该变体攻击利用了在紧固号码中的正交基础的存在,而不是使用子场中的公钥矩阵,它们在完整字段中使用乘法矩阵并将晶格还原算法应用于较小尺寸的合适投影晶格。他们还表明,通过晶格减少破坏的参数和实施结果,它们的攻击优于子场攻击的更好。在本文中,我们从基彻口和Fouque [12]的技术结果用于子场中的现场元素的相对规范,我们使用Hermite因子来估计晶格基础减少算法的输出,以便分析一般选择参数的参数Albrecht等人的子场攻击。 [1]。因此,我们获得了更好地选择攻击与较小模数适用的子字段的估计。我们的实验结果表明,我们可以用小于Albrecht等人的模量攻击过度拉伸的NTRU。和Kirchner和Fouque。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号