Loading...
research article
Cryptanalysis of the Double-Moduli Cryptosystem
In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in [1]. We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt the encrypted messages. We explain, step by step, how an attacker can construct an equivalent private key and guess what the original plaintext was. Our attack is efficient and provides good experimental results.
Type
research article
Authors
Publication date
2012
Volume
05
Issue
12
Start page
834
End page
838
Peer reviewed
NON-REVIEWED
EPFL units
Available on Infoscience
January 27, 2013
Use this identifier to reference this record