Public Key Cryptography – PKC 2007
DOI: 10.1007/978-3-540-71677-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003

Abstract: Abstract. At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce the key size. They claimed that PJH is secure against all possible attacks, especially against lattice attacks. However, in this paper, we present a key recovery attack, based on lattice theory, against PJH. The running time of our attack is drastically short. For example, we could recover all secret keys within 10 minutes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
1

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 18 publications
(27 reference statements)
0
9
1
Order By: Relevance
“…For many parameters, the numerical gap given in [14] is much lower than what could be hoped from our predictions for LLL, but there is a simple explanation. The problem considered in [14] is actually much easier than a general Unique-SVP problem: it is the embedding of a CVP problem when we already know a nearly-orthogonal basis and the target vector is very close to the lattice. This implies that LLL only performs a size-reduction of the last basis vector, which immediately discloses the solution.…”
Section: The Ggh Challengescontrasting
confidence: 61%
See 3 more Smart Citations
“…For many parameters, the numerical gap given in [14] is much lower than what could be hoped from our predictions for LLL, but there is a simple explanation. The problem considered in [14] is actually much easier than a general Unique-SVP problem: it is the embedding of a CVP problem when we already know a nearly-orthogonal basis and the target vector is very close to the lattice. This implies that LLL only performs a size-reduction of the last basis vector, which immediately discloses the solution.…”
Section: The Ggh Challengescontrasting
confidence: 61%
“…This implies that LLL only performs a size-reduction of the last basis vector, which immediately discloses the solution. This also explains why the LLL running times of [14] were surprisingly low in high dimension.…”
Section: The Ggh Challengesmentioning
confidence: 91%
See 2 more Smart Citations
“…In 2003, Paeng, Jung and Ha [59] proposed to use some lattices built on a polynomial ring. However, in 2007, Han, Kim, and Yeom [32] used lattice reduction to cryptanalyze this scheme. Their attack can successfully recover the secret key even in a huge dimension (> 1000) and make the Paeng-Jung-Ha scheme [59] unusable.…”
Section: Cvp-based Cryptosystemsmentioning
confidence: 99%