Advertisement

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

  • Yeow Meng Chee
  • Antoine Joux
  • Jacques Stern
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 576)

Abstract

At the 1990 EuroCrypt Conference, Niemi proposed a new publickey cryptosystem based on modular knapsacks. Y.M. Chee in Singapore, A. Joux and J. Stern in Paris independently found that this cryptosystem is insecure. Our two cryptanalytic methods are slightly different, but they are both based on the LLL algorithm. This is one more example of a cryptosystem that can be broken using this powerful algorithm.

References

  1. [Adl83]
    L. Adleman. On Breaking the Iterated Merkle-Hellman Public Key Cryptosystem, in: Advances in Cryptology, Proceedings of CRYPTO’ 82, Plenum Press, New York, 1983, 303–308.Google Scholar
  2. [CLJ91]
    A. J. Coster, B. LaMacchia, A. Joux, A. Odlyzko, C. P. Schnorr and J. Stern. Improved Low-Density Subset Sum Algorithms, to appear.Google Scholar
  3. [LLL82]
    A. K. Lenstra, H. W. Lenstra Jr. and L. Lovász. Factoring Polynomials with Rational Coefficients, Mathematische Annalen 261 (1982), 515–534.zbMATHCrossRefMathSciNetGoogle Scholar
  4. [Nie91]
    V. Niemi. A New Trapdoor in Knapsacks, in: Advances in Cryptology, Proceedings of EUROCRYPT’ 90, Lecture Notes in Computer Science 473, Springer-Verlag, Berlin, 1991, 405–411.Google Scholar
  5. [ScE91]
    C. P. Schnorr, M. Euchner. Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems, in: Proceedings of the FCT’91, Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear.Google Scholar
  6. [Sha82]
    A. Shamir. A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem, in: Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, IEEE, New York, 1982, 145–152.Google Scholar
  7. [Ste87]
    J. Stern. Secret Linear Congruential Generators are Not Cryptographically Secure, in: Proceedings of the 28th IEEE Symposium on Foundations of Computer Science, IEEE, New York, 1987, 421–426.Google Scholar
  8. [ST91]
    J. Stern and P. Toffin. Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers, in: Advances in Cryptology, Proceedings of EUROCRYPT’ 90, Lecture Notes in Computer Science 473, Springer-Verlag, Berlin, 1991, 313–317.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1992

Authors and Affiliations

  • Yeow Meng Chee
    • 1
  • Antoine Joux
    • 2
  • Jacques Stern
    • 2
  1. 1.Center for Information TechnologyNational Computer SystemsRepublic of Singapore
  2. 2.DMI-GRECCParis Cedex 05France

Personalised recommendations