Chapter

Information Security and Privacy

Volume 2727 of the series Lecture Notes in Computer Science pp 274-284

Date:

Key Recovery Attacks on NTRU without Ciphertext Validation Routine

  • Daewan HanAffiliated withNational Security Research Institute
  • , Jin HongAffiliated withNational Security Research Institute
  • , Jae Woo HanAffiliated withNational Security Research Institute
  • , Daesung KwonAffiliated withNational Security Research Institute

* Final gross prices may vary according to local VAT.

Get Access

Abstract

NTRU is an efficient public-key cryptosystem proposed by Hoffstein, Pipher, and Silverman. Assuming access to a decryption oracle, we show ways to recover the private key of NTRU systems that do not include a ciphertext validating procedure. The strongest of our methods will employ just a single call to the oracle, and in all cases, the number of calls needed will be small enough to be realistic.