Skip to main content

Knapsack Public Key Cryptosystems and Diophantine Approximation

Extended Abstract

  • Chapter
Book cover Advances in Cryptology

Abstract

This paper presents and analyzes cryptanalytic attacks on knapsack public key cryptosystems that are based on ideas from Diophantine approximation. Shamir’s attack on the basic Merkle-Hellman knapsack cryptosystem is shown to depend on the existence of “unusually good” simultaneous Diophantine approximations to a vector constructed from the public key. This aspect of Shamir’s attack carries over to multiply iterated knapsack cryptosystems: there are “unusually good” simultaneous Diophantine approximations to an analogous vector constructed from the public key. These “unusually good” simultaneous Diophantine approximations can be used to break multiply iterated knapsaçk cryptosystems provided one can solve a certain nonlinear Diophantine approximation problem. This nonlinear problem is solved in the simplest case and then used to give a new cryptanalytic attack on doubly iterated knapsack cryptosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. L. Adleman, On Breaking the Iterated Merkle-Hellman Public Key Cryptosystem, in: Advances in Cryptology, Proceedings of Crypto-82 (Eds: D. Chaum, R. Rivest, A. T. Sherman ), Plenum Press 1983, 303–308.

    Google Scholar 

  2. L. Adleman, On Breaking Generalized Knapsack Public Key Cryptosytems, Proc. 15th Annual ACM Symposium on Theory of Computing, 1983, 40 2412.

    Google Scholar 

  3. E. F. Brickell, Solving low-density knapsacks, these proceedings.

    Google Scholar 

  4. E. F. Brickell, J. C. Lagarias and A. M. Odlyzko, Evaluation of Adleman’s Attack on Multiply Iterated Knapsacks (Abstract), these proceedings.

    Google Scholar 

  5. E. F. Brickell and G. J. Simmons, A Status Report on Knapsack Based Public Key Cryptosystems, Congressus Numerantium 37 (1983), 3–72.

    Google Scholar 

  6. E. F. Brickell, J. A. Davis, and G. J. Simmons, A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems, in: Advances in Cryptalogy, Proceedings of Crypto-82 (Eds: D. Chaum, R. Rivest, A. T. Sherman ), Plenum Press, New York 1983, 289–301.

    Google Scholar 

  7. Y. Desmedt, J. Vandewalle, R. Govaerts, A Critical Analysis of the Security of Knapsack Public Key Algorithms, preprint.

    Google Scholar 

  8. J. C. Lagarias, The Computational Complexity of Simultaneous Diophantine Approximation Problems, Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science (1982), 32–39. (to appear: SIAM J. Computing. )

    Google Scholar 

  9. J. C. Lagarias, Performance Analysis of Shamir’s Attack on the Basic Merkle-Hellman Knapsack Public Key Cryptosystem, in preparation.

    Google Scholar 

  10. J. C. Lagarias, Simultaneous Diophantine Approximation of Rationals by Rationals, preprint.

    Google Scholar 

  11. J. C. Lagarias and A. M. Odlyzko, Solving Low-Density Subset Sum Problems, Proc. 24th Annual IEEE Symposium on Foundations of Computer Science (1983), 1–10.

    Google Scholar 

  12. A. K. Lenstra, H. W. Lenstra, Jr. and L. Lovasz, Factoring polynomials with rational coefficients, Math. Annalen. 261 (1982), 515–534.

    Article  Google Scholar 

  13. H. W. Lenstra, Jr., Integer programming with a fixed number of variables, Math. of Operations Research, to appear.

    Google Scholar 

  14. R. Merkle and M. Hellman, Hiding Information and Signatures in Trapdoor Knapsacks, IEEE Trans. Information Theory IT-24 (1978), 525–530.

    Google Scholar 

  15. A. M. Odlyzko, Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme, IEEE Trans. Information Theory, to appear.

    Google Scholar 

  16. A. Shamir, A polynomial time algorithm for breaking the basic MerkleHellman cryptosystem, Proc. 23rd Annual Symposium on Foundations of Computer Science (1982), 145–152.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1984 Plenum Press, New York

About this chapter

Cite this chapter

Lagarias, J.C. (1984). Knapsack Public Key Cryptosystems and Diophantine Approximation. In: Chaum, D. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4684-4730-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4684-4730-9_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4684-4732-3

  • Online ISBN: 978-1-4684-4730-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics