基于嵌入的攻击对基于网格的 GGH 密码系统的影响

IF 0.5 Q3 MATHEMATICS Malaysian Journal of Mathematical Sciences Pub Date : 2023-12-14 DOI:10.47836/mjms.17.4.09
A. Mandangan,, H. Kamarulhaili,, M. A. Asbullah,
{"title":"基于嵌入的攻击对基于网格的 GGH 密码系统的影响","authors":"A. Mandangan,, H. Kamarulhaili,, M. A. Asbullah,","doi":"10.47836/mjms.17.4.09","DOIUrl":null,"url":null,"abstract":"The Goldreich-Goldwasser-Halevi (GGH) cryptosystem is declared broken due to the modified versions of the embedding attacks, known as Nguyen's σ, Nguyen's 2σ and Lee-Hahn's attacks. Despite using the same approach as the original embedding attack, these attacks deployed different strategies and resulted in different performances for breaking the GGH cryptosystem. In this paper, we described those strategies in detail. Moreover, we investigated the mathematical factors behind these attacks' ability and performance discrepancies. Mathematical proof examines and discusses the factors that triggered those variances. As a result, the expected lattice gap and implemented lattice dimensions are mathematically proven as the factors that significantly influenced these attacks' performance. By demonstrating how the attacks manipulated these factors, any lattice-based cryptosystem that relies on the hardness of the CVP could avoid repeating the same slipup as the GGH. Hence, precautionary action could be proactively taken to prevent it from being threatened by embedding-based attacks.","PeriodicalId":43645,"journal":{"name":"Malaysian Journal of Mathematical Sciences","volume":"23 8","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Efficiency of Embedding-Based Attacks on the GGH Lattice-Based Cryptosystem\",\"authors\":\"A. Mandangan,, H. Kamarulhaili,, M. A. Asbullah,\",\"doi\":\"10.47836/mjms.17.4.09\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Goldreich-Goldwasser-Halevi (GGH) cryptosystem is declared broken due to the modified versions of the embedding attacks, known as Nguyen's σ, Nguyen's 2σ and Lee-Hahn's attacks. Despite using the same approach as the original embedding attack, these attacks deployed different strategies and resulted in different performances for breaking the GGH cryptosystem. In this paper, we described those strategies in detail. Moreover, we investigated the mathematical factors behind these attacks' ability and performance discrepancies. Mathematical proof examines and discusses the factors that triggered those variances. As a result, the expected lattice gap and implemented lattice dimensions are mathematically proven as the factors that significantly influenced these attacks' performance. By demonstrating how the attacks manipulated these factors, any lattice-based cryptosystem that relies on the hardness of the CVP could avoid repeating the same slipup as the GGH. Hence, precautionary action could be proactively taken to prevent it from being threatened by embedding-based attacks.\",\"PeriodicalId\":43645,\"journal\":{\"name\":\"Malaysian Journal of Mathematical Sciences\",\"volume\":\"23 8\",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2023-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Malaysian Journal of Mathematical Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47836/mjms.17.4.09\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"MATHEMATICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Malaysian Journal of Mathematical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47836/mjms.17.4.09","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MATHEMATICS","Score":null,"Total":0}
引用次数: 0

摘要

Goldreich-Goldwasser-Halevi (GGH) 密码系统由于嵌入攻击的改进版本(即 Nguyen's σ、Nguyen's 2σ 和 Lee-Hahn's 攻击)而被破解。尽管使用了与原始嵌入攻击相同的方法,但这些攻击采用了不同的策略,导致破解 GGH 密码系统的性能不同。在本文中,我们详细介绍了这些策略。此外,我们还研究了这些攻击能力和性能差异背后的数学因素。数学证明研究并讨论了引发这些差异的因素。结果,预期的网格间隙和实施的网格维度被数学证明是显著影响这些攻击性能的因素。通过证明攻击是如何操纵这些因素的,任何依赖于 CVP 难度的基于晶格的密码系统都可以避免重蹈 GGH 的覆辙。因此,可以主动采取预防措施,防止受到基于嵌入的攻击的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Efficiency of Embedding-Based Attacks on the GGH Lattice-Based Cryptosystem
The Goldreich-Goldwasser-Halevi (GGH) cryptosystem is declared broken due to the modified versions of the embedding attacks, known as Nguyen's σ, Nguyen's 2σ and Lee-Hahn's attacks. Despite using the same approach as the original embedding attack, these attacks deployed different strategies and resulted in different performances for breaking the GGH cryptosystem. In this paper, we described those strategies in detail. Moreover, we investigated the mathematical factors behind these attacks' ability and performance discrepancies. Mathematical proof examines and discusses the factors that triggered those variances. As a result, the expected lattice gap and implemented lattice dimensions are mathematically proven as the factors that significantly influenced these attacks' performance. By demonstrating how the attacks manipulated these factors, any lattice-based cryptosystem that relies on the hardness of the CVP could avoid repeating the same slipup as the GGH. Hence, precautionary action could be proactively taken to prevent it from being threatened by embedding-based attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
1.10
自引率
20.00%
发文量
0
期刊介绍: The Research Bulletin of Institute for Mathematical Research (MathDigest) publishes light expository articles on mathematical sciences and research abstracts. It is published twice yearly by the Institute for Mathematical Research, Universiti Putra Malaysia. MathDigest is targeted at mathematically informed general readers on research of interest to the Institute. Articles are sought by invitation to the members, visitors and friends of the Institute. MathDigest also includes abstracts of thesis by postgraduate students of the Institute.
期刊最新文献
Pricing Quanto Options in Renewable Energy Markets The Efficiency of Embedding-Based Attacks on the GGH Lattice-Based Cryptosystem A Study of Families of Bistar and Corona Product of Graph: Reverse Topological Indices Invariance Analysis and Closed-form Solutions for The Beam Equation in Timoshenko Model The Effect of GeoGebra Software on Achievement and Engagement Among Secondary School Students
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1