Fault analysis of the ntruencrypt cryptosystem

14Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we present a fault analysis of the original NTRU public key cryptosystem. The fault model in which we analyze the cipher is the one in which the attacker is assumed to be able to fault a small number of coefficients of the polynomial input to (or output from) the second step of the decryption process but cannot control the exact location of injected faults. For this specific original instantiation of the NTRU encryption system with parameters (N, p, q), our attack succeeds with probability ≈ 1 - 1/p and when the number of faulted coefficients is upper bounded by t, it requires O((pN)t ) polynomial inversions in ℤ/pℤ[x]/(xN - 1). © 2011 The Institute of Electronics, Information and Communication Engineers.

Cite

CITATION STYLE

APA

Kamal, A. A., & Youssef, A. (2011). Fault analysis of the ntruencrypt cryptosystem. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(4), 1156–1158. https://doi.org/10.1587/transfun.E94.A.1156

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free