Poking Holes in Knapsack Cryptosystems

Slides:



Advertisements
Similar presentations
Asymmetric Encryption Prof. Ravi Sandhu. 2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext.
Advertisements

RSA.
7. Asymmetric encryption-
Abdullah Sheneamer CS591-F2010 Project of semester Presentation University of Colorado, Colorado Springs Dr. Edward RSA Problem and Inside PK Cryptography.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Chapter 3 Encryption Algorithms & Systems (Part B)
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
Lecture 5 Overview Does DES Work? Differential Cryptanalysis Idea – Use two plaintext that barely differ – Study the difference in the corresponding.
CSCI 398 Research Topics in Computer Science Yana Kortsarts Computer Science Department Widener University Chester, PA.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
Computer System Security CSE 5339/7339
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
RSA Ramki Thurimella.
Knapsack Cipher. 0-1 knapsack problem Given a positive integer C and a vector A=(a 1,...,a n ) of positive integers, find a subset of the elements of.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
8.6. Knapsack Ciphers. The Concept At the core of the Knapsack cipher is the Knapsack problem: At the core of the Knapsack cipher is the Knapsack problem:
Merkle-Hellman Knapsack Cryptosystem
Public Key Systems 1 Merkle-Hellman Knapsack Public Key Systems 2 Merkle-Hellman Knapsack  One of first public key systems  Based on NP-complete problem.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
1 Security through complexity Ana Nora Sovarel. 2 Projects Please fill one slot on the signup sheet. One meeting for each group. All members must agree.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Merkle-Hellman
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
Public Key Encryption.
Public Key Cryptosystem
Asymmetric-Key Cryptography
Network Security Design Fundamentals Lecture-13
ElGamal Cryptosystem In 1984 Taher ElGamal presented a cryptosystem which is based on the Discrete Logarithm. Thus ElGamal simplified the Die-Hellman key.
RSA Slides by Kent Seamons and Tim van der Horst
Public Key Encryption Systems
PUBLIC-KEY ENCRYPTION Focusing on RSA
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO By Dr
Handbook of Applied Cryptography - CH8, Public-Key Encryption
CHAPTER 5: Public-key cryptography
Knapsack Cryptosystems
NTRUSign Parameters Challenge
Knapsack Cryptosystems
Background: Lattices and the Learning-with-Errors problem
Private-Key Cryptography
Input: A={a1, a2, … an} – public key, S - ciphertext
Real-world Security of Public Key Crypto
Asymmetric Cryptography
ICS 353: Design and Analysis of Algorithms
Rivest, Shamir and Adleman
Symmetric-Key Cryptography
Hard Problems Some problems are hard to solve.
Cryptology Design Fundamentals
Introduction to Algorithms Second Edition by
Introduction to Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Public Key Encryption Systems
Network Security Design Fundamentals Lecture-13
The RSA Public-Key Encryption Algorithm
Lecture 7: Key Distribution
LAB 3: Digital Signature
Presentation transcript:

Poking Holes in Knapsack Cryptosystems Grayson Myers

Knapsack (Subset Sum) Problem Given integers a1,…,an Given a target sum S (“knapsack”). Determine if there exists a subset of the integers that sums to S. In other words, find binary x1,…,xn so: S = ∑ xi*ai NP-complete

Merkle-Hellman (1978) Public-key cryptosystem based on the knapsack problem Choose large, relatively-prime integers M and W Create a superincreasing sequence b1,…,bn Private key is M, W, and the b’s. Public key is sequence a1,…,an, s.t. ai = bi*W mod M Suggestion: n = 100, M is 202 bits

Merkle-Hellman (cont.) To encrypt an n-bit message x1,…,xn: Compute S = ∑ xi*ai To decrypt: Compute S’ = W-1*S mod M Solve S’ = ∑ xi*bi for xi Easy because b’s are superincreasing Works as long as ∑ bi < M.

Shamir’s Attack (1982) Exploits structure in the ai sequence to find M and W-1 Results in some superincreasing sequence that allows the message to be recovered

Lagarias and Odlyzko (1983) Solve low-density subset sum problems directly Do lattice basis reduction on the following basis: V1= 1 0 … 0 -a1 0 1 … 0 -a2 V2= … Vn= 0 0 … 1 -an Vn+1= 0 0 … 0 S

Lagarias and Odlyzko (Cont.) Vectors in L look like: z1(v1) + z2(v2) + … + zn(vn) + zn+1(vn+1) In particular, this vector is in L: x = (x1, x2,…, xn, 0) x is very short, therefore likely to appear in the reduced basis Works when density of subset sum is low Defined as n/(# of bits in S)

Summary Knapsack cryptosystems: Elegant Fast Insecure Subset sum problem is NP-complete, but there are too many easy cases.