A hybrid lattice-reduction and meet-in-the-middle attack against NTRU

130Citations
Citations of this article
62Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of the running times of the best (known) lattice reduction schemes to recover the private key. We show that there is in fact a continuum of more efficient attacks between these two attacks. We show that by combining lattice reduction and a meet-in-the-middle strategy one can reduce the number of loops in attacking the NTRUEncrypt private key from 2 84.2 to 260.3, for the k = 80 parameter set. In practice the attack is still expensive (dependent on ones choice of cost-metric), although there are certain space/time tradeoffs that can be applied. Asymptotically our attack remains exponential in the security parameter k, but it dictates that NTRUEncrypt parameters must be chosen so that the meet-in-the-middle attack has complexity 2 even after an initial lattice basis reduction of complexity 2 . © International Association for Cryptologie Research 2007.

Cite

CITATION STYLE

APA

Howgrave-Graham, N. (2007). A hybrid lattice-reduction and meet-in-the-middle attack against NTRU. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4622 LNCS, pp. 150–169). Springer Verlag. https://doi.org/10.1007/978-3-540-74143-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free