Cryptanalysis of the Double-Moduli Cryptosystem
In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in . We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt the encrypted messages. We explain, step by step, how an attacker can construct an equivalent private key and guess what the original plaintext was. Our attack is efficient and provides good experimental results.