Cryptanalysis of the Double-Moduli Cryptosystem

In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in [1]. We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt the encrypted messages. We explain, step by step, how an attacker can construct an equivalent private key and guess what the original plaintext was. Our attack is efficient and provides good experimental results.


Published in:
Int'l J. of Communications, Network and System Sciences, 05, 12, 834-838
Year:
2012
ISSN:
1913-3723
Keywords:
Laboratories:




 Record created 2013-01-27, last modified 2018-03-17


Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)