{"title":"p-adic attack of knapsack cryptosystem","authors":"A. Abramov","doi":"10.1109/SIBCOM.2001.977500","DOIUrl":null,"url":null,"abstract":"The cryptattack of homogeneous knapsack systems is considered. The system is called homogeneous if the message symbols </spl alpha//sub 1/, /spl alpha//sub 2/, /spl alpha//sub 3/, ..., /spl alpha//sub n/> are changed from 0 to q, q/spl ges/1. This attack is based on presentation of the cryptogram and the public key components by p-adic decomposition. The question of cryptattack complexity is brought to the problem of the module p selection while taking into account the transfers expansion limitation only from one digit to next old digit. This attack breaks most of the classic knapsack systems without selection and essentially decreases the selection for knapsack cryptosystems. The developed scheme of attack allows estimating the time of decryption before the cryptogram is received. That leads to essential speeding up of decryption.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCOM.2001.977500","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The cryptattack of homogeneous knapsack systems is considered. The system is called homogeneous if the message symbols are changed from 0 to q, q/spl ges/1. This attack is based on presentation of the cryptogram and the public key components by p-adic decomposition. The question of cryptattack complexity is brought to the problem of the module p selection while taking into account the transfers expansion limitation only from one digit to next old digit. This attack breaks most of the classic knapsack systems without selection and essentially decreases the selection for knapsack cryptosystems. The developed scheme of attack allows estimating the time of decryption before the cryptogram is received. That leads to essential speeding up of decryption.