scispace - formally typeset
Journal ArticleDOI

Reconstructing truncated integer variables satisfying linear congruences

Reads0
Chats0
TLDR
A general polynomial time algorithm is proposed to find small integer solutions to systems of linear congruences and will solve most problems when twice as much information as that necessary to uniquely determine the variables is available.
Abstract
We propose a general polynomial time algorithm to find small integer solutions to systems of linear congruences. We use this algorithm to obtain two polynomial time algorithms for reconstructing the values of variables $x_1 , \cdots ,x_k $ when we are given some linear congruences relating them together with some bits obtained by truncating the binary expansions of the variables. The first algorithm reconstructs the variables when either the high order bits or the low order bits of the $x_i $ are known. It is essentially optimal in its use of information in the sense that it will solve most problems almost as soon as the variables become uniquely determined by their constraints. The second algorithm reconstructs the variables when an arbitrary window of consecutive bits of the variables is known. This algorithm will solve most problems when twice as much information as that necessary to uniquely determine the variables is available. Two cryptanalytic applications of the algorithms are given: predicting li...

read more

Citations
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book ChapterDOI

The shrinking generator

TL;DR: A new construction of a pseudorandom generator based on a simple combination of two LFSRs is presented, suitable for practical implementation of efficient stream cipher cryptosystems.
Book ChapterDOI

Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes

TL;DR: It is shown that computing the most significant bits of the secret key in a Diffie-Hellman key-exchange protocol from the public keys of the participants is as hard as computing the secretKey itself.
Book

Modern Cryptography, Probabilistic Proofs and Pseudorandomness

TL;DR: This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness, following a common theme that explores the interplay between randomness and computation.
References
More filters
Proceedings ArticleDOI

Improved algorithms for integer programming and related lattice problems

Ravi Kannan
TL;DR: The proposed algorithm first finds a “more orthogonal” basis for a lattice than those of Lenstra (1981) and Lenstra, Lenstra and Lovasz (1982), but in time 0(ndn poly (length of input)).
Journal ArticleDOI

Polynomial Algorithms for Computing the Smith and Hermite Normal Forms of an Integer Matrix

TL;DR: Recently, Frumkin pointed out that none of the well-known algorithms that transform an integer matrix into Smith or Hermite normal form is known to be polynomially bounded in its runn...
Book ChapterDOI

Cracking a multiplicative congruential encryption algorithm

James Reeds
TL;DR: This paper shows how the computationally efficient solution of a mathematics problem leads to the successful cracking of a cryptographic system.