Cargando…
Security Analysis of DBTRU Cryptosystem
DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings [Formula: see text]. DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algeb...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9601391/ https://www.ncbi.nlm.nih.gov/pubmed/37420368 http://dx.doi.org/10.3390/e24101349 |
_version_ | 1784817053255860224 |
---|---|
author | Tong, Xiaofei Bi, Jingguo Duan, Yufei Li, Lixiang Wang, Licheng |
author_facet | Tong, Xiaofei Bi, Jingguo Duan, Yufei Li, Lixiang Wang, Licheng |
author_sort | Tong, Xiaofei |
collection | PubMed |
description | DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings [Formula: see text]. DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algebra attack against the DBTRU cryptosystem, which can break DBTRU for all recommended parameter choices. The paper shows that the plaintext can be achieved in less than 1 s via the linear algebra attack on a single PC. |
format | Online Article Text |
id | pubmed-9601391 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96013912022-10-27 Security Analysis of DBTRU Cryptosystem Tong, Xiaofei Bi, Jingguo Duan, Yufei Li, Lixiang Wang, Licheng Entropy (Basel) Article DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings [Formula: see text]. DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algebra attack against the DBTRU cryptosystem, which can break DBTRU for all recommended parameter choices. The paper shows that the plaintext can be achieved in less than 1 s via the linear algebra attack on a single PC. MDPI 2022-09-23 /pmc/articles/PMC9601391/ /pubmed/37420368 http://dx.doi.org/10.3390/e24101349 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tong, Xiaofei Bi, Jingguo Duan, Yufei Li, Lixiang Wang, Licheng Security Analysis of DBTRU Cryptosystem |
title | Security Analysis of DBTRU Cryptosystem |
title_full | Security Analysis of DBTRU Cryptosystem |
title_fullStr | Security Analysis of DBTRU Cryptosystem |
title_full_unstemmed | Security Analysis of DBTRU Cryptosystem |
title_short | Security Analysis of DBTRU Cryptosystem |
title_sort | security analysis of dbtru cryptosystem |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9601391/ https://www.ncbi.nlm.nih.gov/pubmed/37420368 http://dx.doi.org/10.3390/e24101349 |
work_keys_str_mv | AT tongxiaofei securityanalysisofdbtrucryptosystem AT bijingguo securityanalysisofdbtrucryptosystem AT duanyufei securityanalysisofdbtrucryptosystem AT lilixiang securityanalysisofdbtrucryptosystem AT wanglicheng securityanalysisofdbtrucryptosystem |