scispace - formally typeset
Search or ask a question

Showing papers by "Craig Gentry published in 2001"


Book ChapterDOI
Craig Gentry1
06 May 2001
TL;DR: NTRU is a fast public key cryptosystem that operates in the ring of polynomials Z[X]/(XN - 1), where the domain parameter N largely determines the security of the system.
Abstract: NTRU is a fast public key cryptosystem presented in 1996 by Hoffstein, Pipher and Silverman of Brown University. It operates in the ring of polynomials Z[X]/(XN - 1), where the domain parameter N largely determines the security of the system. Although N is typically chosen to be prime, Silverman proposes taking N to be a power of two to enable the use of Fast Fourier Transforms. We break this scheme for the specified parameters by reducing lattices of manageably small dimension to recover partial information about the private key. We then use this partial information to recover partial information about the message or to recover the private key in its entirety.

94 citations


Book ChapterDOI
09 Dec 2001
TL;DR: It is shown that the problem on which NSS relies is much easier than anticipated, and an attack is described that allows efficient forgery of a signature on any message, and that a transcript of signatures leaks information about the secret key.
Abstract: In 1996, a new cryptosystem called NTRU was introduced, related to the hardness of finding short vectors in specific lattices. At Eurocrypt 2001, the NTRU Signature Scheme (NSS), a signature scheme apparently related to the same hard problem, was proposed. In this paper, we show that the problem on which NSS relies is much easier than anticipated, and we describe an attack that allows efficient forgery of a signature on any message. Additionally, we demonstrate that a transcript of signatures leaks information about the secret key: using a correlation attack, it is possible to recover the key from a few tens of thousands of signatures. The attacks apply to the recently proposed parameter sets NSS251-3-SHA1-1, NSS347-3-SHA1-1, and NSS503-3-SHA1-1 in [2]. Following the attacks, NTRU researchers have investigated enhanced encoding/verification methods in [11].

63 citations