Skip to main content

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Included in the following conference series:

Abstract

At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA problem. In this paper we present a heuristic attack that enables us to recover the private key from the public key. In particular, we show that breaking the system can be reduced to finding a short vector in a lattice which can be achieved using the L 3-lattice reduction algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Ajtai and C. Dwork, A public key cryptosystem with worst-case/average case equivalence, Proc. of the twenty ninth annual ACM symposium on theory of computing, pp. 284–293, 1997.

    Google Scholar 

  2. O. Goldreich, S. Goldwasser and S. Halevi, Public key crypto systems from lattice reduction problems, Advances in Cryptology, Pro. of CRYPTO’ 97, Springer-Verlag, LNCS 1294, pp. 112–131.

    Chapter  Google Scholar 

  3. G. H. Hardy and E. M. Wright, An introduction to the theory of numbers, 5th edition, Oxford University Press, 1979.

    Google Scholar 

  4. A J. Menezes, P. C. van Oorschot and S A. Vanstone, Handbook of Applied Cryptographic Research, CRC Press, 1996.

    Google Scholar 

  5. P. Nguyen and J. Stern, Lattice reduction in cryptology: An update, Algorithmic Number Theory, Proc. of ANTS-IV, Springer-Verlag, LNCS 1838.

    Chapter  Google Scholar 

  6. P. Nguyen, Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto’ 97, Advances in Cryptology, Pro. of CRYPTO’99, Springer-Verlag, LNCS 1666, pp. 288–304.

    Chapter  Google Scholar 

  7. P. Nguyen and J. Stern, Cryptanalysis of the Ajtai-Dwork Cryptosystem, Advances in Cryptology, Pro. of CRYPTO’ 98, Springer-Verlag, LNCS 1462, pp. 223–242.

    Chapter  Google Scholar 

  8. P. Nguyen, J. Stern: Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC’ 97. Selected Areas in Cryptography 1998, Springer-Verlag, LNCS 1556, pp. 213–218.

    Chapter  Google Scholar 

  9. P. Nguyen and I. Shparlinkski, Private communications, Jan 24, 2001.

    Google Scholar 

  10. Pate Williams, Algorithms from Handbook of Applied Cryptography, C code available at http://www.mindspring.com/~pate/crypto/chap03.html.

  11. H. Yoo, S. Hong, S. Lee, O. Yi and M. Sung, A Proposal of a New Public Key Cryptosystem using Matrices Over a Ring, Fifth Australian Conference on Information Security and Privacy (ACISP 2000), Springer-Verlag, LNCS 1841, 2000, pp. 41–48.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Youssef, A., Gong, G. (2001). Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics