skip to main content
10.1145/1655925.1656095acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

Relationship between weight of plaintext and successful attacks in knapsack cryptosystems

Authors Info & Claims
Published:24 November 2009Publication History

ABSTRACT

The density is a very important parameter in knapsack public-key cryptosystems. It is known that the knapsack cryptosystem is broken with the low-density attack when the density is low. In 2005, Nguyen and Stern introduced the pseudo-density instead of the conventional density in order to evaluate CR and OTU cryptosystems. In 2008, Kunihiro introduced a new density in order to unify the conventional density and the pseudo-density. From Kunihiro's result, we can guess that the plaintext is disclosed with the low-density attack when the weight of the plaintext is low even in the conventional knapsack PKC. In this paper, we investigate the relationship between the weight of plaintext and successful attacks in conventional knapsack cryptosystems.

References

  1. W. P. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," Proc. the 35th Annual Symposium on Foundations of Computer Science, pp.124--134, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. C. Merkle and M. E. Hellman, "Hiding information and signatures in trapdoor knapsacks," IEEE Trans. Inf. Theory, IT-24(5), pp.525--530, 1978.Google ScholarGoogle ScholarCross RefCross Ref
  3. A. Shamir, "A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystems," Proc. Crypto'82, LNCS, pp.279--288, Springer-Verlag, Berlin, 1982.Google ScholarGoogle Scholar
  4. L. M. Adleman, "On breaking the titrated Merkle-Hellman public-key cryptosystem," Plenum Press. Crypto'82, pp.303--308. 1982.Google ScholarGoogle Scholar
  5. J. C. Lagarias and A. M. Odlyzko, "Solving low density subset sum problems," J. Assoc. Comp. Math., vol.32, pp.229--246, Preliminary version in Proc. 24th IEEE, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. J. Coster, B. A. LaMacchia, A. M. Odlyzko and C. P. Schnorr, "An improved low-density subset sum algorithm," In Advances in Cryptology Proc. EUROCRYPTO'91, LNCS, pp. 54--67. Springer-Verlag, Berlin, 1991.Google ScholarGoogle Scholar
  7. M. Kasahara and Y. Murakami, "New public key cryptosystems and the application," Technical Report of IEICE, ISEC99-55(1999--11), pp.21--28, 1999.Google ScholarGoogle Scholar
  8. T. Hattori, Y. Murakami and M. Kasahara, "Notes on security of SHP cryptosystems," The 24th Symposium on Information Theory and Its Applications, pp.351--354, 2001.Google ScholarGoogle Scholar
  9. B. Chor and R. L. Rivest, "A knapsack-type public key cryptosystem based on arithmetic in finite fields," Proc. of CRYPTO'84, LNCS196, pp.54--65, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Okamoto, K. Tanaka and S. Uchiyama, "Quantum publickey cryptosystems," Proc. of CRYPTO2000, LNCS1880, pp.147--165, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Q. Nguyen and J. Stern, "Adapting density attacks to low-weight knapsacks," Proc. Asiacrypt2005, pp.41--58, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Kunihiro, "New definition of density on knapsack cryptosystems," Proc. Africacrypt2008, pp.156--173, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. K. Lenstra, H. W. Lenstra and L. L. ovasz, "Factoring polynomials with integer coefficients," Mathematische Annalen 261, pp.515--534, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  14. Victor Shoup, "NTL: A library for doing number theory," http://www.shoup.net/ntl/Google ScholarGoogle Scholar

Index Terms

  1. Relationship between weight of plaintext and successful attacks in knapsack cryptosystems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
          November 2009
          1479 pages
          ISBN:9781605587103
          DOI:10.1145/1655925

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
        • Article Metrics

          • Downloads (Last 12 months)1
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader