Skip to main content

Distinguishing Attack on the NTRUCipher Encryption Scheme

Abstract

A distinguishing attack on the NTRUCipher symmetric encryption scheme defined over the residue ring modulo a cyclotomic polynomial over a finite field of prime order is proposed. The attack is based on the existence of a homomorphism from this ring into the specified field and can be quite effective under sufficiently general conditions.

This is a preview of subscription content, access via your institution.

References

  1. M. R. Valluri, “NTRUCipher-lattice based secret key encryption,” arXiv:1710.01928V2.6/10/2017 [Submitted on 5 Oct 2017].

  2. J. Hoffstein, J. Pipher, and J. H. Silverman, “NTRU: A ring-based public key cryptosystem,” in: J. P. Buhler (ed.), Algorithmic Number Theory, ANTS 1998; Lecture Notes in Computer Science, Vol. 1423, Springer, Berlin–Heidelberg (1998), pp. 267–288. https://doi.org/https://doi.org/10.1007/BFb0054868.

  3. A. A. Matiyko, “The comparative analysis of NTRUEncrypt and NTRUCipher encryption schemes,” Mathematical and Computer Modelling, Ser. Technical Sci., Issue 19, 81–87 (2019).

  4. A. Matiyko, “BKW-attack on NTRUCIPHER and NTRUCIPHER+ encryption schemes,” Information Technology and Security, Vol. 8, Iss. 2, 164–176 (2020).

  5. M. R. Albrecht, B. R. Curtis, A. Deo, A. Davidson, R. Player, E. W. Postlethwaite, F. Virdia, and T. Wunderer, “Estimate all the {LWE, NTRU} schemes!” Cryptology ePrint Archive, Report 2018/331. URL: http://eprint.iacr.org/2018/331.

  6. S. Diop, B. O. Sané, M. Seck, and N. Diarra, “NTRU-LPR IND-CPA: A new ideal lattice-based scheme,” Cryptology ePrint Archive, Report 2018/109. URL: http://eprint.iacr.org/2018/109.

  7. R. Lidl and H. Niederreiter, Finite Fields, Cambridge Univ. Press (1997).

  8. V. Lyubashevsky, C. Peikert, and O. Regev, “On ideal lattices and learning with errors over rings,” in: H. Gilbert (ed.), Advances in Cryptology — EUROCRYPT 2010; Lecture Notes in Comp. Sci., Vol. 6110, Springer, Berlin–Heidelberg (2010), pp. 1–23. https://doi.org/https://doi.org/10.1007/978-3-642-13190-5_1.

  9. J. Katz and Y. Lindell, Introduction to Modern Cryptography, CRC Press, Boca Raton (2015).

    MATH  Google Scholar 

  10. W. Hoeffding, “Probability inequalities for sums of bounded random variables,” J. Amer. Statist. Assoc., Vol. 58, Iss. 301, 13–30 (1963).

    MathSciNet  Article  Google Scholar 

  11. A. V. Cheremushkin, Lectures on Arithmetic Algorithms in Cryptography [in Russian], MTsNMO, Moscow (2002).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. N. Alekseychuk.

Additional information

Translated from Kibernetyka ta Systemnyi Analiz, No. 2, March–April, 2022, pp. 29–34.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Alekseychuk, A.N., Matiyko, A.A. Distinguishing Attack on the NTRUCipher Encryption Scheme. Cybern Syst Anal 58, 186–190 (2022). https://doi.org/10.1007/s10559-022-00449-y

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10559-022-00449-y

Keywords

  • lattice-based cryptography
  • symmetric encryption scheme
  • distinguishing attack
  • cyclotomic polynomial
  • NTRUCipher