{"title":"基于嵌入的攻击对基于网格的 GGH 密码系统的影响","authors":"A. Mandangan,, H. Kamarulhaili,, M. A. Asbullah,","doi":"10.47836/mjms.17.4.09","DOIUrl":null,"url":null,"abstract":"The Goldreich-Goldwasser-Halevi (GGH) cryptosystem is declared broken due to the modified versions of the embedding attacks, known as Nguyen's σ, Nguyen's 2σ and Lee-Hahn's attacks. Despite using the same approach as the original embedding attack, these attacks deployed different strategies and resulted in different performances for breaking the GGH cryptosystem. In this paper, we described those strategies in detail. Moreover, we investigated the mathematical factors behind these attacks' ability and performance discrepancies. Mathematical proof examines and discusses the factors that triggered those variances. As a result, the expected lattice gap and implemented lattice dimensions are mathematically proven as the factors that significantly influenced these attacks' performance. By demonstrating how the attacks manipulated these factors, any lattice-based cryptosystem that relies on the hardness of the CVP could avoid repeating the same slipup as the GGH. Hence, precautionary action could be proactively taken to prevent it from being threatened by embedding-based attacks.","PeriodicalId":43645,"journal":{"name":"Malaysian Journal of Mathematical Sciences","volume":"23 8","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Efficiency of Embedding-Based Attacks on the GGH Lattice-Based Cryptosystem\",\"authors\":\"A. Mandangan,, H. Kamarulhaili,, M. A. Asbullah,\",\"doi\":\"10.47836/mjms.17.4.09\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Goldreich-Goldwasser-Halevi (GGH) cryptosystem is declared broken due to the modified versions of the embedding attacks, known as Nguyen's σ, Nguyen's 2σ and Lee-Hahn's attacks. Despite using the same approach as the original embedding attack, these attacks deployed different strategies and resulted in different performances for breaking the GGH cryptosystem. In this paper, we described those strategies in detail. Moreover, we investigated the mathematical factors behind these attacks' ability and performance discrepancies. Mathematical proof examines and discusses the factors that triggered those variances. As a result, the expected lattice gap and implemented lattice dimensions are mathematically proven as the factors that significantly influenced these attacks' performance. By demonstrating how the attacks manipulated these factors, any lattice-based cryptosystem that relies on the hardness of the CVP could avoid repeating the same slipup as the GGH. Hence, precautionary action could be proactively taken to prevent it from being threatened by embedding-based attacks.\",\"PeriodicalId\":43645,\"journal\":{\"name\":\"Malaysian Journal of Mathematical Sciences\",\"volume\":\"23 8\",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2023-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Malaysian Journal of Mathematical Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47836/mjms.17.4.09\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"MATHEMATICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Malaysian Journal of Mathematical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47836/mjms.17.4.09","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MATHEMATICS","Score":null,"Total":0}
The Efficiency of Embedding-Based Attacks on the GGH Lattice-Based Cryptosystem
The Goldreich-Goldwasser-Halevi (GGH) cryptosystem is declared broken due to the modified versions of the embedding attacks, known as Nguyen's σ, Nguyen's 2σ and Lee-Hahn's attacks. Despite using the same approach as the original embedding attack, these attacks deployed different strategies and resulted in different performances for breaking the GGH cryptosystem. In this paper, we described those strategies in detail. Moreover, we investigated the mathematical factors behind these attacks' ability and performance discrepancies. Mathematical proof examines and discusses the factors that triggered those variances. As a result, the expected lattice gap and implemented lattice dimensions are mathematically proven as the factors that significantly influenced these attacks' performance. By demonstrating how the attacks manipulated these factors, any lattice-based cryptosystem that relies on the hardness of the CVP could avoid repeating the same slipup as the GGH. Hence, precautionary action could be proactively taken to prevent it from being threatened by embedding-based attacks.
期刊介绍:
The Research Bulletin of Institute for Mathematical Research (MathDigest) publishes light expository articles on mathematical sciences and research abstracts. It is published twice yearly by the Institute for Mathematical Research, Universiti Putra Malaysia. MathDigest is targeted at mathematically informed general readers on research of interest to the Institute. Articles are sought by invitation to the members, visitors and friends of the Institute. MathDigest also includes abstracts of thesis by postgraduate students of the Institute.