Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Mathematical Cryptology

Managing Editor: Magliveras, Spyros S. / Steinwandt, Rainer / Trung, Tran

Editorial Board: Blackburn, Simon R. / Blundo, Carlo / Burmester, Mike / Cramer, Ronald / Gilman, Robert / Gonzalez Vasco, Maria Isabel / Grosek, Otokar / Helleseth, Tor / Kim, Kwangjo / Koblitz, Neal / Kurosawa, Kaoru / Lauter, Kristin / Lange, Tanja / Menezes, Alfred / Nguyen, Phong Q. / Pieprzyk, Josef / Rötteler, Martin / Safavi-Naini, Rei / Shparlinski, Igor E. / Stinson, Doug / Takagi, Tsuyoshi / Williams, Hugh C. / Yung, Moti


CiteScore 2018: 1.41

SCImago Journal Rank (SJR) 2018: 0.342
Source Normalized Impact per Paper (SNIP) 2018: 1.076

Mathematical Citation Quotient (MCQ) 2018: 0.75

Open Access
Online
ISSN
1862-2984
See all formats and pricing
More options …
Volume 3, Issue 3

Issues

Algebraic attack on NTRU using Witt vectors and Gröbner bases

Gérald Bourgeois
  • Département de Mathématiques, Université de la Polynésie Francaise, BP 6570, 98702 Faa'a, Tahiti, French Polynesia, France. Email:
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Jean-Charles Faugère
  • INRIA, Centre Paris-Rocquencourt, SALSA Project, UPMC, Univ Paris 06, LIP6, CNRS, UMR 7606, LIP6, Université Pierre et Marie Curie Paris 6, UFR Ingénierie 919, LIP6 Passy Kennedy, bureau 733, Boite Courrier 169, 4, Place Jussieu 75252 Paris cedex 05, France. Email:
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2010-01-20 | DOI: https://doi.org/10.1515/JMC.2009.011

Abstract

We present an algebraic attack on NTRU (restricted to the case where the parameter q is a power of two) using the method of the Witt vectors proposed by Silverman, Smart and Vercauteren [Springer: 278–298, 2005]; the latter considered only the first two bits of a Witt vector attached to the recovering of the secret key in order to reduce the problem to the resolution of an algebraic system over 𝔽2. The theoretical complexity of this resolution was not studied by the authors. In this paper, we use the first three bits of the Witt vectors to obtain supplementary equations which allow us to reduce the complexity of the attack. Using Gröbner basis complexity results of overdetermined systems, we have been able to provide a theoretical complexity analysis. Additionally we provide experimental results illustrating the efficiency of this approach. Moreover, we prove that the use of the fourth bit does not improve the complexity, what is surprising. Unfortunately, for standard values of the NTRU parameters, the proven complexity is around 2246 and this attack does not make it possible to find the private key.

Keywords.: NTRU; algebraic attack; Gröbner bases; Witt vectors; FGb

About the article

Received: 2008-12-30

Revised: 2009-10-27

Published Online: 2010-01-20

Published in Print: 2009-09-01


Citation Information: Journal of Mathematical Cryptology, Volume 3, Issue 3, Pages 205–214, ISSN (Online) 1862-2984, ISSN (Print) 1862-2976, DOI: https://doi.org/10.1515/JMC.2009.011.

Export Citation

Comments (0)

Please log in or register to comment.
Log in