Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Public Key Cryptography

PKC 2007: Public Key Cryptography – PKC 2007 pp 107–117Cite as

  1. Home
  2. Public Key Cryptography – PKC 2007
  3. Conference paper
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003

Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003

  • Daewan Han1,
  • Myung-Hwan Kim2 &
  • Yongjin Yeom1 
  • Conference paper
  • 1881 Accesses

  • 4 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4450)

Abstract

At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce the key size. They claimed that PJH is secure against all possible attacks, especially against lattice attacks. However, in this paper, we present a key recovery attack, based on lattice theory, against PJH. The running time of our attack is drastically short. For example, we could recover all secret keys within 10 minutes even for the system with n = 1001 on a single PC. Unlike other lattice attacks against NTRUEncrypt and GGH, the attack may be applied well to the system with much larger parameters. We present some clues why we believe so. Based on this belief, we declare that PJH should not be used in practice.

Keywords

  • Paeng-Jung-Ha cryptosystem
  • GGH
  • NTRUEncrypt
  • Lattice attack

Chapter PDF

Download to read the full chapter text

References

  1. Ajtai, M.: Generating Hard Instances of Lattice Problems. In: Proc. of 28th ACM STOC, pp. 99–108. ACM Press, New York (1996)

    Google Scholar 

  2. Ajtai, M., Dwork, C.: A Public-key Cryptosystem with Worst-case/Average-case Equivalence. In: Proc. of 29th ACM STOC, pp. 284–293. ACM Press, New York (1997)

    Google Scholar 

  3. Coppersmith, D., Shamir, A.: Lattice Attacks on NTRU. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 52–61. Springer, Heidelberg (1997)

    Google Scholar 

  4. Goldreich, G., Goldwasser, S., Halevi, S.: Public-key Cryptosystems from Lattice Reduction Problems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 112–131. Springer, Heidelberg (1997)

    Google Scholar 

  5. Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J.P. (ed.) Algorithmic Number Theory. LNCS, vol. 1423, pp. 267–288. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  6. Hoffstein, J., Silverman, J.H., Whyte, W.: Estimated Breaking Times for NTRU Lattices. Technical Report #12(Version 2), NTRU Cryptosystems (2003)

    Google Scholar 

  7. Howgrave-Graham, N., Silverman, J.H., Whyte, W.: Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 118–135. Springer, Heidelberg (2005)

    Google Scholar 

  8. Lenstra, A.K., Lenstra Jr., H.W., Lovász, L.: Factoring Polynomials with Rational Coefficients. Mathematische Ann. 261, 513–534 (1982)

    Google Scholar 

  9. McEliece, R.J.: A public-key Cryptosystem Based on Algebraic Coding Theory. DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., Pasadena, CA, pp. 114–116 (January 1978)

    Google Scholar 

  10. Micciancio, D.: Improving Lattice Based Cryptosystems Using the Hermite Normal Form. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol. 2146, pp. 126–145. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  11. Micciancio, D., Goldwasser, S.: Complexity of lattice problems: A Cryptographic perspective. Kluwer Academic Publishers, Dordrecht (2002)

    MATH  Google Scholar 

  12. Nguyen, P.Q.: Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 288–304. Springer, Heidelberg (1999)

    Google Scholar 

  13. Nguyen, P.Q., Regev, O.: Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 271–288. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  14. Nguyen, P.Q., Stehlé, D.: Floating-point LLL revisited. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 215–233. Springer, Heidelberg (2005)

    Google Scholar 

  15. Nguyen, P.Q., Stehlé, D.: LLL on the Average. In: Hess, F., Pauli, S., Pohst, M. (eds.) Algorithmic Number Theory. LNCS, vol. 4076, pp. 238–256. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  16. Nguyen, P.Q., Stern, J.: The Two Faces of Lattices in Cryptology. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol. 2146, pp. 146–180. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  17. NTL - A Number Theory Library. Available at http://shoup.net/ntl

  18. Paeng, S., Jung, B.E., Ha, K.: A Lattice Based Public Key Cryptosystem Using Polynomial Representations. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 292–308. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  19. Schnorr, C.P.: A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms. Theoretical Computer Science 53, 201–224 (1987)

    CrossRef  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. National Security Research Institute, 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-350, Korea

    Daewan Han & Yongjin Yeom

  2. Department of Mathematical Science and ISaC-RIM, Seoul National University, Seoul, 151-747, Korea

    Myung-Hwan Kim

Authors
  1. Daewan Han
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Myung-Hwan Kim
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Yongjin Yeom
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Tatsuaki Okamoto Xiaoyun Wang

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Han, D., Kim, MH., Yeom, Y. (2007). Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. In: Okamoto, T., Wang, X. (eds) Public Key Cryptography – PKC 2007. PKC 2007. Lecture Notes in Computer Science, vol 4450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71677-8_8

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-71677-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71676-1

  • Online ISBN: 978-3-540-71677-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature