Cargando…

Security Analysis of DBTRU Cryptosystem

DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings [Formula: see text]. DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algeb...

Descripción completa

Detalles Bibliográficos
Autores principales: Tong, Xiaofei, Bi, Jingguo, Duan, Yufei, Li, Lixiang, Wang, Licheng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9601391/
https://www.ncbi.nlm.nih.gov/pubmed/37420368
http://dx.doi.org/10.3390/e24101349
_version_ 1784817053255860224
author Tong, Xiaofei
Bi, Jingguo
Duan, Yufei
Li, Lixiang
Wang, Licheng
author_facet Tong, Xiaofei
Bi, Jingguo
Duan, Yufei
Li, Lixiang
Wang, Licheng
author_sort Tong, Xiaofei
collection PubMed
description DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings [Formula: see text]. DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algebra attack against the DBTRU cryptosystem, which can break DBTRU for all recommended parameter choices. The paper shows that the plaintext can be achieved in less than 1 s via the linear algebra attack on a single PC.
format Online
Article
Text
id pubmed-9601391
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96013912022-10-27 Security Analysis of DBTRU Cryptosystem Tong, Xiaofei Bi, Jingguo Duan, Yufei Li, Lixiang Wang, Licheng Entropy (Basel) Article DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings [Formula: see text]. DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algebra attack against the DBTRU cryptosystem, which can break DBTRU for all recommended parameter choices. The paper shows that the plaintext can be achieved in less than 1 s via the linear algebra attack on a single PC. MDPI 2022-09-23 /pmc/articles/PMC9601391/ /pubmed/37420368 http://dx.doi.org/10.3390/e24101349 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tong, Xiaofei
Bi, Jingguo
Duan, Yufei
Li, Lixiang
Wang, Licheng
Security Analysis of DBTRU Cryptosystem
title Security Analysis of DBTRU Cryptosystem
title_full Security Analysis of DBTRU Cryptosystem
title_fullStr Security Analysis of DBTRU Cryptosystem
title_full_unstemmed Security Analysis of DBTRU Cryptosystem
title_short Security Analysis of DBTRU Cryptosystem
title_sort security analysis of dbtru cryptosystem
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9601391/
https://www.ncbi.nlm.nih.gov/pubmed/37420368
http://dx.doi.org/10.3390/e24101349
work_keys_str_mv AT tongxiaofei securityanalysisofdbtrucryptosystem
AT bijingguo securityanalysisofdbtrucryptosystem
AT duanyufei securityanalysisofdbtrucryptosystem
AT lilixiang securityanalysisofdbtrucryptosystem
AT wanglicheng securityanalysisofdbtrucryptosystem