[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/19478.19505guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Breaking iterated knapsacks

Published: 23 August 1985 Publication History

Abstract

This paper presents an outline of an attack that we have used successfully to break iterated knapsacks. Although we do not provide a proof that the attack almost always works, we do provide some heuristic arguments. We also give a detailed description of the examples we have broken.

References

[1]
L. Adleman, "On Breaking the Iterated Merkle-Hellman Public Key Cryptosystem," Advances in Cryptology , Proceedings of Crypto 82, Plenum Press 1983, 303-308.
[2]
E. F. Brickell, "Solving Low-Density Knapsacks," to appear in Advances in Cryptology , Proceedings of Crypto 83, Plenun Press.
[3]
E. F. Brickell, J. C. Lagarias and A. M. Odlyzko, Evaluation of Adleman's Attack on Multiply Iterated Knapsacks (Abstract), to appear in Advances in Cryptology , Proceedings of Crypto 83, Plenum Press.
[4]
E. F. Brickell and G. J. Simmons, "A Status Report on Knapsack Based Public Key Cryptosystems," Congressus Numerantium 37 (1983), 3-72.
[5]
Y. Desmedt, J. Vandewalle, R. Govaerts, "A Critical Analysis of the Security of Knapsack Public Key Algorithms, preprint.
[6]
J. C. Lagarias, "Simultaneous Diophantine Approximation of Rationals by Rationals, preprint.
[7]
J. C. Lagarias, "Knapsack Public Key Cryptosystems and Diophantine Approximation," to appear in Advances in Cryptology , Proceedings of Crypto 83, Plenum Press.
[8]
J. C. Lagarias and A. M. Odlyzko, "Solving Low-Density Subset Sum Problems, Proc. 24th Annual IEEE Symposium on Foundations of Computer Science (1983), 1-10.
[9]
A. K. Lenstra, H. W. Lenstra, Jr. and L. Lovasz, "Factoring Polynomials with Rational Coefficients," Math. Annalen , 261 (1982), 515-534.
[10]
R. Merkle and M. Hellman, "Hiding Information and Signatures in Trapdoor Knapsacks," IEEE Trans. Information Theory IT-24 (1978), 525-530.
[11]
A. M. Odlyzko, "Cryptanalytic Attacks on the Multiplicative Knapsack Cryptosystem and on Shamir's Fast Signature Scheme," preprint.
[12]
M. Petit, "Etude mathematique de certains systemes de cipherement: les sacs a dos," doctor's these, Universite de Rennes, France.
[13]
A. Shamir, "A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem," Proc. 23rd Annual Symposium on Foundations of Computer Science (1982), 145-152.
[14]
A. Shamir, "The strongest knapsack-based cryptosystem," presented at Crypto 82.

Cited By

View all
  • (2021)Dimension-preserving reductions between SVP and CVP in different p-normsProceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3458064.3458209(2444-2462)Online publication date: 10-Jan-2021
  • (2015)Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian SamplingProceedings of the forty-seventh annual ACM symposium on Theory of Computing10.1145/2746539.2746606(733-742)Online publication date: 14-Jun-2015
  • (2013)Improved cryptanalysis of a knapsack-based probabilistic encryption schemeInformation Sciences: an International Journal10.1016/j.ins.2012.07.063222(779-783)Online publication date: 1-Feb-2013
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Proceedings of CRYPTO 84 on Advances in cryptology
August 1985
491 pages
ISBN:0387156585

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 23 August 1985

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Dimension-preserving reductions between SVP and CVP in different p-normsProceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3458064.3458209(2444-2462)Online publication date: 10-Jan-2021
  • (2015)Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian SamplingProceedings of the forty-seventh annual ACM symposium on Theory of Computing10.1145/2746539.2746606(733-742)Online publication date: 14-Jun-2015
  • (2013)Improved cryptanalysis of a knapsack-based probabilistic encryption schemeInformation Sciences: an International Journal10.1016/j.ins.2012.07.063222(779-783)Online publication date: 1-Feb-2013
  • (2012)Crypto galore!The Multivariate Algorithmic Revolution and Beyond10.5555/2344236.2344240(39-50)Online publication date: 1-Jan-2012
  • (2012)New attacks for knapsack based cryptosystemsProceedings of the 8th international conference on Security and Cryptography for Networks10.1007/978-3-642-32928-9_18(326-342)Online publication date: 5-Sep-2012
  • (2009)Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter rangeInformation Sciences: an International Journal10.1016/j.ins.2009.08.030179:24(4219-4226)Online publication date: 1-Dec-2009
  • (2007)Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way FunctionsComputational Complexity10.1007/s00037-007-0234-916:4(365-411)Online publication date: 1-Dec-2007
  • (2005)The NP-completeness columnACM Transactions on Algorithms10.1145/1077464.10774761:1(160-176)Online publication date: 1-Jul-2005
  • (2005)Security analysis and improvement of a double-trapdoor encryption schemeApplied Mathematics and Computation10.1016/j.amc.2004.10.026169:1(41-50)Online publication date: 1-Oct-2005
  • (1998)Lattice ReductionJournal of Cryptology10.1007/s00145990004211:3(161-185)Online publication date: 1-Jun-1998
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media