Loading...
Please wait, while we are loading the content...
Similar Documents
Reduced memory meet-in-the-middle attack against the NTRU private key
| Content Provider | Scilit |
|---|---|
| Author | Vredendaal, Christine Van |
| Copyright Year | 2016 |
| Description | Journal: LMS Journal of Computation and Mathematics NTRU is a public-key cryptosystem introduced at ANTS-III. The two most used techniques in attacking the NTRU private key are meet-in-the-middle attacks and lattice-basis reduction attacks. Howgrave-Graham combined both techniques in 2007 and pointed out that the largest obstacle to attacks is the memory capacity that is required for the meet-in-the-middle phase. In the present paper an algorithm is presented that applies low-memory techniques to find ‘golden’ collisions to Odlyzko’s meet-in-the-middle attack against the NTRU private key. Several aspects of NTRU secret keys and the algorithm are analysed. The running time of the algorithm with a maximum storage capacity of$w$is estimated and experimentally verified. Experiments indicate that decreasing the storage capacity$w$by a factor$1increases the running time by a factor$\sqrt{c}$. |
| Ending Page | 57 |
| Starting Page | 43 |
| ISSN | 00221295 |
| e-ISSN | 14611570 |
| DOI | 10.1112/s1461157016000206 |
| Journal | LMS Journal of Computation and Mathematics |
| Issue Number | A |
| Volume Number | 19 |
| Language | English |
| Publisher | Wiley-Blackwell |
| Publisher Date | 2016-08-26 |
| Access Restriction | Open |
| Subject Keyword | Journal: LMS Journal of Computation and Mathematics Middle Attack Ntru Private Private Key Reduced Memory Meet |
| Content Type | Text |
| Resource Type | Article |
| Subject | Physiology |