A lower dimension lattice attack on NTRU

  • Zhichao Yang
  • Shaojing FuEmail author
  • Longjiang Qu
  • Chao Li



This work was supported by National Natural Science Foundation of China (Grant Nos. 11531002, 61572026) and Open Foundation of State Key Laboratory of Cryptology.

Supplementary material

11432_2017_9175_MOESM1_ESM.pdf (119 kb)
A Lower Dimension Lattice Attack on NTRU


  1. 1.
    Hoffstein J, Pipher J, Silverman J H. NTRU: a ringbased public key cryptosystem. Algorithmic Number Theory, 1998, 1423: 267–288CrossRefzbMATHGoogle Scholar
  2. 2.
    Coppersmith D, Shamir A. Lattice attacks on NTRU. In: Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques, Konstanz, 1997. 52–61Google Scholar
  3. 3.
    Silverman J H, Whyte W. Estimating decryption failure probabilities for NTRUEncrypt. 2003. downloads/NTRU/resources/NTRUTech018.pdfGoogle Scholar
  4. 4.
    Silverman J H. Dimension-reduced lattices, zeroforced lattices, and the NTRU public key cryptosystem. 1999. static/downloads/NTRU/resources/NTRUTech013. pdfGoogle Scholar
  5. 5.
    Shoup V. NTL: A Library for Doing Number Theory Version 5.5.2, 2010. Scholar
  6. 6.
    Chen Y M, Nguyen P Q. BKZ 2.0: better lattice security estimates. In: Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, 2011. 1–20Google Scholar
  7. 7.
    Albrecht M, Bai S, Ducas L. A subfield lattice attack on overstretched NTRU assumptions: cryptanalysis of some FHE and graded encoding schemes. In: Proceedings of the 36th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer, 2016. 153–178Google Scholar
  8. 8.
    Cheon J H, Jeong J, Lee C. An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero. Lms J Comput Math, 2016, 19: 255–266CrossRefzbMATHMathSciNetGoogle Scholar
  9. 9.
    Kirchner P, Fouque P A. Revisiting lattice attacks on overstretched NTRU parameters. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2017. 3–26Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017

Authors and Affiliations

  • Zhichao Yang
    • 1
  • Shaojing Fu
    • 1
    • 2
    Email author
  • Longjiang Qu
    • 2
    • 3
  • Chao Li
    • 1
    • 3
  1. 1.College of ComputerNational University of Defense TechnologyChangshaChina
  2. 2.State Key Laboratory of CryptologyBeijingChina
  3. 3.College of ScienceNational University of Defense TechnologyChangshaChina

Personalised recommendations