Skip to main content
Log in

Mixed-radix Naccache–Stern encryption

  • Regular Paper
  • Published:
Journal of Cryptographic Engineering Aims and scope Submit manuscript

Abstract

In this work, we explore a combinatorial optimization problem stemming from the Naccache–Stern cryptosystem. We show that solving this problem results in bandwidth improvements, and suggest a polynomial-time approximation algorithm to find an optimal solution. Our work suggests that using optimal radix encoding results in an asymptotic 50% increase in bandwidth.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. This can also be described as a modular variant of the “subset product” problem.

  2. In the original NS setting, p would be at least 7, 420, 738, 134, 871.

  3. Indeed, \(p_\text {min}\) is closest to the 75th primorial.

References

  1. Naccache, D., Stern, J.: A new public-key cryptosystem. In: Fumy, W. (ed.) Advances in Cryptology—EUROCRYPT’97, Lecture Notes in Computer Science, vol. 1233, pp. 27–36. Springer, Heidelberg (1997)

    Google Scholar 

  2. Adleman, L.M.: On breaking the iterated Merkle–Hellman public-key cryptosystem. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology—CRYPTO’82, pp. 303–308. Plenum Press, New York (1982)

    Google Scholar 

  3. Brickell, E.F.: Breaking iterated Knapsacks. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology—CRYPTO’84, Lecture Notes in Computer Science, vol. 196, pp. 342–358. Springer, Heidelberg (1984)

    Google Scholar 

  4. Joux, A., Stern, J.: Cryptanalysis of another Knapsack cryptosystem. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) Advances in Cryptology—ASIACRYPT’91, Lecture Notes in Computer Science, vol. 739, pp. 470–476. Springer, Heidelberg (1993)

    Google Scholar 

  5. Chee, Y.M., Joux, A., Stern, J.: The cryptoanalysis of a new public-key cryptosystem based on modular Knapsacks. In: Feigenbaum, J. (ed.) Advances in Cryptology—CRYPTO’91, Lecture Notes in Computer Science, vol. 576, pp. 204–212. Springer, Heidelberg (1992)

    Google Scholar 

  6. Lenstra Jr., H.W.: On the Chor–Rivest knapsack cryptosystem. J. Cryptol. 3(3), 149–155 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  7. Herold, G., Meurer, A.: New attacks for knapsack based cryptosystems. In: Visconti, I., Prisco, R.D. (eds.) SCN 12: 8th International Conference on Security in Communication Networks, Lecture Notes in Computer Science, vol. 7485, pp. 326–342. Springer, Heidelberg (2012)

    Google Scholar 

  8. Chevallier-Mames, B., Naccache, D., Stern, J.: Linear bandwidth Naccache–Stern encryption. In: Ostrovsky, R., Prisco, R.D., Visconti, I. (eds.) SCN 08: 6th International Conference on Security in Communication Networks, Lecture Notes in Computer Science, vol. 5229, pp. 327–339. Springer, Heidelberg (2008)

    Google Scholar 

  9. Brier, É., Géraud, R., Naccache, D.: Exploring Naccache–Stern knapsack encryption. In: P. Farshim, E. Simion (eds.) Innovative Security Solutions for Information Technology and Communications—10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers, Lecture Notes in Computer Science, vol. 10543, pp. 67–82. Springer (2017). https://doi.org/10.1007/978-3-319-69284-5_6

  10. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York (1979)

    MATH  Google Scholar 

  11. De Loera, J.A., Hemmecke, R., Köppe, M., Weismantel, R.: Integer polynomial optimization in fixed dimension. Math. Oper. Res. 31(1), 147–153 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  12. Barvinok, A.I.: A polynomial time algorithm for counting integral points in polyhedra when the dimension is fixed. Math. Oper. Res. 19(4), 769–779 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  13. Barvinok, A.I., Pommersheim, J.E.: An algorithmic theory of lattice points. New Perspect. Algebr. Combin. 38, 91 (1999)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rémi Géraud.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Géraud, R., Naccache, D. Mixed-radix Naccache–Stern encryption. J Cryptogr Eng 9, 277–282 (2019). https://doi.org/10.1007/s13389-018-0188-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13389-018-0188-7

Keywords

Navigation