p-adic attack of knapsack cryptosystem

A. Abramov
{"title":"p-adic attack of knapsack cryptosystem","authors":"A. Abramov","doi":"10.1109/SIBCOM.2001.977500","DOIUrl":null,"url":null,"abstract":"The cryptattack of homogeneous knapsack systems is considered. The system is called homogeneous if the message symbols </spl alpha//sub 1/, /spl alpha//sub 2/, /spl alpha//sub 3/, ..., /spl alpha//sub n/> are changed from 0 to q, q/spl ges/1. This attack is based on presentation of the cryptogram and the public key components by p-adic decomposition. The question of cryptattack complexity is brought to the problem of the module p selection while taking into account the transfers expansion limitation only from one digit to next old digit. This attack breaks most of the classic knapsack systems without selection and essentially decreases the selection for knapsack cryptosystems. The developed scheme of attack allows estimating the time of decryption before the cryptogram is received. That leads to essential speeding up of decryption.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCOM.2001.977500","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The cryptattack of homogeneous knapsack systems is considered. The system is called homogeneous if the message symbols are changed from 0 to q, q/spl ges/1. This attack is based on presentation of the cryptogram and the public key components by p-adic decomposition. The question of cryptattack complexity is brought to the problem of the module p selection while taking into account the transfers expansion limitation only from one digit to next old digit. This attack breaks most of the classic knapsack systems without selection and essentially decreases the selection for knapsack cryptosystems. The developed scheme of attack allows estimating the time of decryption before the cryptogram is received. That leads to essential speeding up of decryption.
背包密码系统的p进攻击
研究了齐次背包系统的密码攻击问题。如果消息符号从0变为q,则系统被称为同构的,q/spl /1。这种攻击是基于p进分解来表示密码和公钥组件。在考虑仅从一位数字到下一位旧数字的传输扩展限制的情况下,将密码攻击复杂性问题归结为模块p的选择问题。这种攻击在没有选择的情况下破坏了大多数经典的背包系统,并从根本上减少了背包密码系统的选择。开发的攻击方案允许在接收密码之前估计解密时间。这就大大加快了解密的速度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信