An Improved Attack on the Basic Merkle-Hellman Knapsack Cryptosystem

被引:9
作者
Liu, Jiayang [1 ]
Bi, Jingguo [2 ,3 ]
Xu, Songyan [2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Beijing Res Inst Telemetry, Beijing 100094, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
LLL algorithm; Merkle-Hellman knapsack cryptosystem; orthogonal lattice; post-quantum cryptography; public-key cryptosystem;
D O I
10.1109/ACCESS.2019.2913678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Knapsack problem is a famous NP-complete problem, which is believed to be difficult to be solved even by a quantum computer. Hence, this type of cryptosystem is a good candidate for post-quantum cryptography. Recently, many new knapsack-based cryptosystems were proposed. The basic operations of all these cryptosystems are superincreasing sequences and modular multiplications, which is the same as the basic Merkle-Hellman cryptosystem. In this paper, we revisit and present an improved version of Shamir's attack on the basic Merkle-Hellman cryptosystem, this new idea would be helpful to estimate the security of the new knapsack-based cryptosystems. The main tool of our attack is the orthogonal lattice technique. More precisely, we first obtain a sublattice containing the private key vector by calculating the orthogonal lattice of the public key vector. Combining with the necessary conditions of the equivalent keys, we can easily recover several groups of equivalent keys. The time complexity of our new attack is lower than Shamir's. The feasibility of our attack is validated by the experimental data.
引用
收藏
页码:59388 / 59393
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 1983, P 15 ANN ACM S THEOR
[2]  
Coster M. J., 1991, COMPUT COMPLEX, P54
[3]  
Kobayashi Kunikatsu, 2010, 2010 International Symposium On Information Theory & Its Applications (ISITA 2010), P428, DOI 10.1109/ISITA.2010.5649307
[4]  
Lagarias J. C., 1984, P INT C AUT LANG PRO, P312, DOI 10.1007/3-540-13345-3_28
[5]   SOLVING LOW-DENSITY SUBSET SUM PROBLEMS [J].
LAGARIAS, JC ;
ODLYZKO, AM .
JOURNAL OF THE ACM, 1985, 32 (01) :229-246
[6]   FACTORING POLYNOMIALS WITH RATIONAL COEFFICIENTS [J].
LENSTRA, AK ;
LENSTRA, HW ;
LOVASZ, L .
MATHEMATISCHE ANNALEN, 1982, 261 (04) :515-534
[7]   INTEGER PROGRAMMING WITH A FIXED NUMBER OF VARIABLES [J].
LENSTRA, HW .
MATHEMATICS OF OPERATIONS RESEARCH, 1983, 8 (04) :538-548
[8]   Equivalent key attack against a public-key cryptosystem based on subset sum problem [J].
Liu, Jiayang ;
Bi, Jingguo .
IET INFORMATION SECURITY, 2018, 12 (06) :498-501
[9]   HIDING INFORMATION AND SIGNATURES IN TRAPDOOR KNAPSACKS [J].
MERKLE, RC ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (05) :525-530
[10]  
Murakami Y, 2012, 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), P735