Lattice attack on group ring NTRU: The case of the dihedral group

09/15/2023
by   Vikas Kumar, et al.
0

Group ring NTRU (GR-NTRU) provides a general structure to design different variants of NTRU-like schemes by employing different groups. Although, most of the schemes in literature are built over cyclic groups, nonabelian groups can also be used. Coppersmith and Shamir in 1997 have suggested that noncommutativity may result in better security against some lattice attacks for some groups. Lattice attacks on the public key of NTRU-like cryptosystems try to retrieve the private key by solving the shortest vector problem (SVP) or its approximation in a lattice of a certain dimension, assuming the knowledge of the public key only. This paper shows that dihedral groups do not guarantee better security against this class of attacks. We prove that retrieving the private key is possible by solving the SVP in two lattices with half the dimension of the original lattice generated for GR-NTRU based on dihedral groups. The possibility of such an attack was mentioned by Yasuda et al.(IACR/2015/1170). In contrast to their proposed approach, we explicitly provide the lattice reduction without any structure theorem from the representation theory for finite groups. Furthermore, we demonstrate the effectiveness of our technique with experimental results.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/17/2022

Message recovery attack to NTRU using a lattice independent from the public key

In the present paper we introduce a new attack on NTRU-HPS cryptosystem ...
research
12/28/2021

A Generalization of Cyclic Code and Applications to Public Key Cryptosystems

In this paper, we define and discuss ϕ-cyclic code, which may be regarde...
research
12/28/2017

A Probabilistic Analysis on a Lattice Attack against DSA

Analyzing the security of cryptosystems under attacks based on the malic...
research
07/29/2019

Lattice Structural Analysis on Sniffing to Denial of Service Attacks

Sniffing is one of the most prominent causes for most of the attacks in ...
research
05/19/2020

Cryptanalysis of ITRU

ITRU cryptosystem is a public key cryptosystem and one of the known vari...
research
05/07/2021

Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group

Whilst lattice-based cryptosystems are believed to be resistant to quant...
research
08/11/2020

The Polynomial Learning With Errors Problem and the Smearing Condition

As quantum computing advances rapidly, guaranteeing the security of cryp...

Please sign up or login with your details

Forgot password? Click here to reset