Cryptanalysis of the Revised - PowerPoint PPT Presentation

About This Presentation
Title:

Cryptanalysis of the Revised

Description:

NTRU Signature Scheme (NSS) Craig Gentry (DoCoMo) Mike Szydlo (RSA) ... The signature is (s, t). (Note t is also publicly computable from s and h) ... – PowerPoint PPT presentation

Number of Views:75
Avg rating:3.0/5.0
Slides: 15
Provided by: asatis84
Category:

less

Transcript and Presenter's Notes

Title: Cryptanalysis of the Revised


1
Cryptanalysis of the Revised NTRU Signature
Scheme (NSS)
Craig Gentry (DoCoMo) Mike Szydlo (RSA)
2
A Brief History of NSS
  • Preliminary NSS
  • Presented at Crypto 2000 Rump
  • Broken by Mironov, and by the inventors
  • NSS in Eurocrypt 2001 proceedings
  • Forgery / key recovery attacks presented at
    Eurocrypt
  • Rump by Gentry, Jonsson, Stern, and Szydlo
  • Motivated new key-gen, sign, and verify
    procedures
  • Revised NSS
  • Sketched at Eurocrypt 2001, details in EESS
    doc (May)
  • Still insecure we give key recovery attacks

Cryptanalysis of the Revised NTRU Signature Scheme
/ 2
3
Revised NSS, Details
  • Basic Elements are Polynomials.
  • Full (unreduced ring) is Zx/(xN-1), (N
    251)
  • (Also Called Cyclotomic Integers).
  • Multiplication in ring also called
    convolution.
  • Auxiliary Rings and Polynomials
  • Truncated Polynomial Ring Zx/(xN-1) mod 128
  • A Small Polynomial has only -1,0,1
    coefficients.

Cryptanalysis of the Revised NTRU Signature Scheme
/ 3
4
Key Generation
  • Private Components
  • f1, g1, u ? Zx/(xN-1) are small
    polynomials.
  • (standardized number of -1,0,1
    coefficients).
  • f3f1u, and g3g1u. are computed.
  • Let v be the small polynomial with uv1 (mod
    3).
  • The private key components are (f,g,v)
  • Public Components
  • Let f_inv be a polynomial with ff_inv1 (mod
    128).
  • Let h be f_invg (mod 128).
  • The public key is (h)

Cryptanalysis of the Revised NTRU Signature Scheme
/ 4
5
Signature
  • Signature (s, t) is computed from f , g , v
    and message m
  • Algorithm
  • Let w1,w2 be random small masking
    polynomials.
  • (Generated by a sub-algorithm).
  • Let w0 be the small poly. with w0(mw1) (mod
    3).
  • Let sf(w03w2) (mod 128)
  • Let tg(w03w2) (mod 128)
  • The signature is (s, t).
  • (Note t is also publicly computable from s and
    h)

Cryptanalysis of the Revised NTRU Signature Scheme
/ 5
6
Verification
  • Multiple Tests, including
  • Norm Conditions
  • Use division modulo 128 and centered norm.
  • (s-m)/p lt B, and (t-m) lt B.
  • (s-t)/p lt B2, and (t-m) lt B.
  • Distribution Tests
  • Mod 3 - Bounds on coefs of s t (mod 3).
  • Quartile - Bounds of coefs in -64,64
  • Thus s and t appear to be from right
    distribution.

Cryptanalysis of the Revised NTRU Signature Scheme
/ 6
7
Lifting the Signatures
  • Design motivation of reduction mod q
  • Hide more information about f and g.
  • Only known lattice was dimension 2N. (NTRU
    Lattice)
  • Unreduced signatures would allow dim N.
    Attacks.
  • For equivalent security use half the key size
  • Lifting Technique Apply CRT to congruences
  • fwmw1 (mod 3), sm (mod 128)
  • The unknown w1 coefs. are mostly 0.
  • Result Nearly have the lifted multiples f
    w and g w
  • Approximations have about 25 errors (out of
    251)

Cryptanalysis of the Revised NTRU Signature Scheme
/ 7
8
Finishing the Lifting
  • Goal Find f w and g w, error-free.
  • Take short transcript of signatures
  • Observation We know correct liftings
  • (f wi) (g wj) (f wj) (g wi)
    0

(Si , Tj)
Measures the errors
Si Tj Sj Ti
  • Iterative Error-Correction Choose the
    correction to (Si, Ti)
  • that sends Si Tj Sj Ti closest to 0.
  • 4 signatures, 25 seconds ? we get unreduced
    signatures

Cryptanalysis of the Revised NTRU Signature Scheme
/ 8
9
We Could Stop Here
  • By finding unreduced f w and g w, weve
    already
  • broken revised NSS.
  • Dim N lattice (instead of 2N) exp. easier
    to reduce

w is GCD
Cryptanalysis of the Revised NTRU Signature Scheme
/ 9
10
Computing f frev Quickly
  • We average sigs to obtain f frev
    approximately.

Converges Quickly!
S Srev ? ? f frev
  • We use approximation in N/2 Dim CVP lattice.
  • With lt 10 sigs (to obtain approx), LLL gives
    us f frev
  • exactly.

Cryptanalysis of the Revised NTRU Signature Scheme
/10
11
A Polynomial-time Approach
  • Textbook GCD approach appears to be exp. in N
  • Our approach Polynomial in N
  • (after experimentally very fast steps)
  • Preliminary step
  • Fast step Compute f frev.
  • Poly step Use f frev and f w to compute
    f.
  • Running times
  • Fast step Less than 1 minute for sugg.
    parameters
  • Poly step Not implimented, but provably O(N
    7).

Cryptanalysis of the Revised NTRU Signature Scheme
/ 11
12
Get f from f frev and f w in Polynomial-time
  • We help LLL it doesnt always find shortest
    vector!

Fact f p-1 ? 1 (mod p) for prime p ? 1 (mod N)
  • Use LLL to get f p-1 a.
  • We know a (mod p), thus maybe a exactly.
    Compute f p-1.
  • Not difficult to compute f from power of f.
  • This algorithm is efficient because LLL does
    not have to
  • find the shortest vector in the lattice.

Cryptanalysis of the Revised NTRU Signature Scheme
/ 12
13
Other Attacks
  • Polynomial attack shows cant just increase
    key size
  • Alternate attacks using Lattices might be
    more efficient.
  • Compute the ratio g/f in Zx/(xN-1) mod Q.
  • Bigger Q improves lattice constants.
  • Can translate into traditional Knapsack
  • Gram Matrix Attack (find the circulant M_f)
  • A known matrix M defines GCD (f).
  • Let G UU_rev UF M_(1/ff_rev) F_rev U_rev.
  • Factor G with modular-Gram-LLL

Cryptanalysis of the Revised NTRU Signature Scheme
/ 13
14
Conclusion
  • These attacks render revised NSS (with sugg.
    parameters)
  • very weak.
  • We have presented a 3-Stage Attack
  • First 2 stages very fast, use about 10 sigs.
  • Last stage polynomial in N.
  • First stage is enough to dramatically reduce
    its security.

Cryptanalysis of the Revised NTRU Signature Scheme
/ 14
Write a Comment
User Comments (0)
About PowerShow.com