Security

Cryptanalysis of the Double-Moduli Cryptosystem

Download Now Free registration required

Executive Summary

In this paper, the authors present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in. They show how, based on the relation between the public and private key, they can construct an attack which allows any passive adversary to decrypt the encrypted messages. They explain, step by step, how an attacker can construct an equivalent private key and guess what the original plaintext was. Their attack is efficient and provides good experimental results.

  • Format: PDF
  • Size: 145.24 KB