Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes

One of the significant post-quantum cryptographic candidates is the NTRU public key cryptosystem. It operates on polynomial rings, where the parameter largely determines the security of the system. Although NTRU is being studied currently, it has a long and well-established history. There are severa...

Full description

Bibliographic Details
Main Authors: Alla Levina, Victor Kadykov, Maheswara Rao Valluri
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10271393/
_version_ 1797660764244279296
author Alla Levina
Victor Kadykov
Maheswara Rao Valluri
author_facet Alla Levina
Victor Kadykov
Maheswara Rao Valluri
author_sort Alla Levina
collection DOAJ
description One of the significant post-quantum cryptographic candidates is the NTRU public key cryptosystem. It operates on polynomial rings, where the parameter largely determines the security of the system. Although NTRU is being studied currently, it has a long and well-established history. There are several lattice-based attacks on NTRU-like systems that exploit the special structures of the rings used in these systems. The aim of this paper is to analyze the original NTRU, NTRU Encrypt, and NTRU Primes encryption schemes by structuring their common elements and showing the strongest hybrid attack using both lattice reduction and meet-in-the-middle (MITM) search on them. Furthermore, it is noted that, ignoring a polynomial factor of the not-well-studied cost of Block Korkin-Zolotarev (BKZ) algorithm, we estimate the security of the construction of encryption keys and show that by balancing lattice reduction costs and a MITM search cost, one can achieve better performance than using any of these methods on their own. Unlike previous studies, we found the way to ignore polynomial impact 22-24 from BKZ loops with multiple shortest vector problem (SVP) and the factor of 27 was omitted from the cost of one step in guessing the SVP.
first_indexed 2024-03-11T18:35:37Z
format Article
id doaj.art-2d2c72a9682f4518bfdcfbc2bf150592
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-11T18:35:37Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-2d2c72a9682f4518bfdcfbc2bf1505922023-10-12T23:01:31ZengIEEEIEEE Access2169-35362023-01-011110993910995210.1109/ACCESS.2023.332169310271393Security Analysis of Hybrid Attack for NTRU-Class Encryption SchemesAlla Levina0https://orcid.org/0000-0003-4421-2411Victor Kadykov1Maheswara Rao Valluri2Laboratory of Fundamentals of Intelligent Systems “LETI”, Saint Petersburg Electrotechnical University “LETI,”, Saint Petersburg, RussiaLaboratory of Fundamentals of Intelligent Systems “LETI”, Saint Petersburg Electrotechnical University “LETI,”, Saint Petersburg, RussiaQuinfosystems Pvt., Ltd., Telangana, IndiaOne of the significant post-quantum cryptographic candidates is the NTRU public key cryptosystem. It operates on polynomial rings, where the parameter largely determines the security of the system. Although NTRU is being studied currently, it has a long and well-established history. There are several lattice-based attacks on NTRU-like systems that exploit the special structures of the rings used in these systems. The aim of this paper is to analyze the original NTRU, NTRU Encrypt, and NTRU Primes encryption schemes by structuring their common elements and showing the strongest hybrid attack using both lattice reduction and meet-in-the-middle (MITM) search on them. Furthermore, it is noted that, ignoring a polynomial factor of the not-well-studied cost of Block Korkin-Zolotarev (BKZ) algorithm, we estimate the security of the construction of encryption keys and show that by balancing lattice reduction costs and a MITM search cost, one can achieve better performance than using any of these methods on their own. Unlike previous studies, we found the way to ignore polynomial impact 22-24 from BKZ loops with multiple shortest vector problem (SVP) and the factor of 27 was omitted from the cost of one step in guessing the SVP.https://ieeexplore.ieee.org/document/10271393/BKZ algorithmcryptographyidealslatticesLLL algorithmNTRU
spellingShingle Alla Levina
Victor Kadykov
Maheswara Rao Valluri
Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes
IEEE Access
BKZ algorithm
cryptography
ideals
lattices
LLL algorithm
NTRU
title Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes
title_full Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes
title_fullStr Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes
title_full_unstemmed Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes
title_short Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes
title_sort security analysis of hybrid attack for ntru class encryption schemes
topic BKZ algorithm
cryptography
ideals
lattices
LLL algorithm
NTRU
url https://ieeexplore.ieee.org/document/10271393/
work_keys_str_mv AT allalevina securityanalysisofhybridattackforntruclassencryptionschemes
AT victorkadykov securityanalysisofhybridattackforntruclassencryptionschemes
AT maheswararaovalluri securityanalysisofhybridattackforntruclassencryptionschemes