Infoscience

Journal article

Cryptanalysis of the Double-Moduli Cryptosystem

In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in [1]. We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt the encrypted messages. We explain, step by step, how an attacker can construct an equivalent private key and guess what the original plaintext was. Our attack is efficient and provides good experimental results.

Keywords: Lattices ; LLL Algorithm ; Primary Residue ; Public-Key Scheme

Reference

Record created on 2013-01-27, modified on 2013-01-27

Fulltext