Cryptanalysis of the Double-Moduli Cryptosystem
In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in . We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt the encrypted messages. We explain, step by step, how an attacker can construct an equivalent private key and guess what the original plaintext was. Our attack is efficient and provides good experimental results.
Record created on 2013-01-27, modified on 2013-01-27