A lower dimension lattice attack on NTRU




This work was supported by National Natural Science Foundation of China (Grant Nos. 11531002, 61572026) and Open Foundation of State Key Laboratory of Cryptology.

Supplementary material

11432_2017_9175_MOESM1_ESM.pdf (119 kb)
A Lower Dimension Lattice Attack on NTRU


  1. 1.
    Hoffstein J, Pipher J, Silverman J H. NTRU: a ringbased public key cryptosystem. Algorithmic Number Theory, 1998, 1423: 267–288CrossRefMATHGoogle Scholar
  2. 2.
    Coppersmith D, Shamir A. Lattice attacks on NTRU. In: Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques, Konstanz, 1997. 52–61Google Scholar
  3. 3.
    Silverman J H, Whyte W. Estimating decryption failure probabilities for NTRUEncrypt. 2003. https://assets.onboardsecurity.com/static/ downloads/NTRU/resources/NTRUTech018.pdfGoogle Scholar
  4. 4.
    Silverman J H. Dimension-reduced lattices, zeroforced lattices, and the NTRU public key cryptosystem. 1999. https://assets.securityinnovation.com/ static/downloads/NTRU/resources/NTRUTech013. pdfGoogle Scholar
  5. 5.
    Shoup V. NTL: A Library for Doing Number Theory Version 5.5.2, 2010. http://shoup.net/ntl/Google Scholar
  6. 6.
    Chen Y M, Nguyen P Q. BKZ 2.0: better lattice security estimates. In: Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, 2011. 1–20Google Scholar
  7. 7.
    Albrecht M, Bai S, Ducas L. A subfield lattice attack on overstretched NTRU assumptions: cryptanalysis of some FHE and graded encoding schemes. In: Proceedings of the 36th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer, 2016. 153–178Google Scholar
  8. 8.
    Cheon J H, Jeong J, Lee C. An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero. Lms J Comput Math, 2016, 19: 255–266CrossRefMATHMathSciNetGoogle Scholar
  9. 9.
    Kirchner P, Fouque P A. Revisiting lattice attacks on overstretched NTRU parameters. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2017. 3–26Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017

Authors and Affiliations

  • Zhichao Yang
    • 1
  • Shaojing Fu
    • 1
    • 2
  • Longjiang Qu
    • 2
    • 3
  • Chao Li
    • 1
    • 3
  1. 1.College of ComputerNational University of Defense TechnologyChangshaChina
  2. 2.State Key Laboratory of CryptologyBeijingChina
  3. 3.College of ScienceNational University of Defense TechnologyChangshaChina

Personalised recommendations