Javascript must be enabled to continue!
Cryptanalysis of Group Ring NTRU: The Case of the Dihedral Group
View through CrossRef
ABSTRACTThe NTRU cryptosystem is one of the earliest proposed schemes for post‐quantum cryptography. With a long history of cryptanalysis and efficient memory and time requirements, NTRU has been standardized by IEEE for public key cryptographic techniques based on hard problems over lattices, and a few NTRU‐style cryptosystems progressed to the third round of the NIST standardization process. The design flexibility of NTRU has resulted in many variants. Group ring NTRU (GR‐NTRU) offers a general framework for designing various NTRU‐like schemes using different groups. Although most schemes in the literature are built over cyclic groups, non‐abelian groups can also be used. Non‐commutativity has been endorsed as a direction to build NTRU variants that are more resistant to some algebraic attacks. Lattice attacks on the public key of NTRU‐like cryptosystems try to retrieve the private key by solving the shortest vector problem (SVP) or its approximation in a lattice of a particular dimension, assuming the knowledge of the public key only. In this work, we analyze the lattice security of GR‐NTRU built over the group ring of the dihedral group of order . We theoretically and experimentally show that dihedral groups do not guarantee better security against this class of attacks than the standard NTRU over the group ring of the cyclic group of order . We prove that retrieving the private key is possible by solving the SVP in two lattices with half the dimension of the original lattice generated for GR‐NTRU based on dihedral groups, that is, the dimension of the lattices to be attacked can be reduced from to and consequently the problem of finding short vectors becomes much easier. We utilize matrix algebra to provide an explicit dimension reduction of the associated lattices without any structure theorem from the representation theory for finite groups, which makes our technique easier to follow and implement. Additionally, experimental results indicate that the naive method of lattice attacks can successfully retrieve a decryption key for only , while our technique can retrieve a decryption key up to , highlighting the effectiveness of our method.
Title: Cryptanalysis of Group Ring NTRU: The Case of the Dihedral Group
Description:
ABSTRACTThe NTRU cryptosystem is one of the earliest proposed schemes for post‐quantum cryptography.
With a long history of cryptanalysis and efficient memory and time requirements, NTRU has been standardized by IEEE for public key cryptographic techniques based on hard problems over lattices, and a few NTRU‐style cryptosystems progressed to the third round of the NIST standardization process.
The design flexibility of NTRU has resulted in many variants.
Group ring NTRU (GR‐NTRU) offers a general framework for designing various NTRU‐like schemes using different groups.
Although most schemes in the literature are built over cyclic groups, non‐abelian groups can also be used.
Non‐commutativity has been endorsed as a direction to build NTRU variants that are more resistant to some algebraic attacks.
Lattice attacks on the public key of NTRU‐like cryptosystems try to retrieve the private key by solving the shortest vector problem (SVP) or its approximation in a lattice of a particular dimension, assuming the knowledge of the public key only.
In this work, we analyze the lattice security of GR‐NTRU built over the group ring of the dihedral group of order .
We theoretically and experimentally show that dihedral groups do not guarantee better security against this class of attacks than the standard NTRU over the group ring of the cyclic group of order .
We prove that retrieving the private key is possible by solving the SVP in two lattices with half the dimension of the original lattice generated for GR‐NTRU based on dihedral groups, that is, the dimension of the lattices to be attacked can be reduced from to and consequently the problem of finding short vectors becomes much easier.
We utilize matrix algebra to provide an explicit dimension reduction of the associated lattices without any structure theorem from the representation theory for finite groups, which makes our technique easier to follow and implement.
Additionally, experimental results indicate that the naive method of lattice attacks can successfully retrieve a decryption key for only , while our technique can retrieve a decryption key up to , highlighting the effectiveness of our method.
Related Results
Hydatid Disease of The Brain Parenchyma: A Systematic Review
Hydatid Disease of The Brain Parenchyma: A Systematic Review
Abstarct
Introduction
Isolated brain hydatid disease (BHD) is an extremely rare form of echinococcosis. A prompt and timely diagnosis is a crucial step in disease management. This ...
Breast Carcinoma within Fibroadenoma: A Systematic Review
Breast Carcinoma within Fibroadenoma: A Systematic Review
Abstract
Introduction
Fibroadenoma is the most common benign breast lesion; however, it carries a potential risk of malignant transformation. This systematic review provides an ove...
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher
Recently, Deep Neural Networks have shown great deal of reliability and applicability as its applications spread in different areas. This paper proposes a cryptanalysis model based...
Some Contributions to Boolean like near Rings
Some Contributions to Boolean like near Rings
In this paper we extend Foster’s Boolean-like ring to Near-rings. We introduce the concept of a Boolean like near-ring. A near-ring N is said to be a Boolean-like near-ring if ...
Shadow and photon ring of black hole in asymptotically safe gravity
Shadow and photon ring of black hole in asymptotically safe gravity
In this paper, we focus on discussing the influence of thin disk accretion and asymptotically safe (AS) gravity correction parameter on the shadow and photon ring of black holes. F...
Threshold Homomorphic Encryption From Provably Secure NTRU
Threshold Homomorphic Encryption From Provably Secure NTRU
Abstract
Homomorphic Encryption (HE) supports computation on encrypted data without the need to decrypt, enabling secure outsourcing of computing to an untrusted clo...
Resonance confinement of collisional particle rings
Resonance confinement of collisional particle rings
We have performed numerical simulations of narrow rings around small bodies, addressing both the m=2 resonance perturbations induced by a rotating tri-axial ellipsoidal central bod...
Photochromic properties calculation of diaryl maleic anhydride
Photochromic properties calculation of diaryl maleic anhydride
Abstract
In the calculation of the photochromic mechanism of (2,3-di(3-furyl)maleic anhydride, DFMA) ( as reported in Acta Phys. Sinica. 2021, 70(16): 163101), it wa...

