The Efficiency of Embedding-Based Attacks on the GGH Lattice-Based Cryptosystem

IF 0.5 Q3 MATHEMATICS
A. Mandangan,, H. Kamarulhaili,, M. A. Asbullah,
{"title":"The Efficiency of Embedding-Based Attacks on the GGH Lattice-Based Cryptosystem","authors":"A. Mandangan,, H. Kamarulhaili,, M. A. Asbullah,","doi":"10.47836/mjms.17.4.09","DOIUrl":null,"url":null,"abstract":"The Goldreich-Goldwasser-Halevi (GGH) cryptosystem is declared broken due to the modified versions of the embedding attacks, known as Nguyen's σ, Nguyen's 2σ and Lee-Hahn's attacks. Despite using the same approach as the original embedding attack, these attacks deployed different strategies and resulted in different performances for breaking the GGH cryptosystem. In this paper, we described those strategies in detail. Moreover, we investigated the mathematical factors behind these attacks' ability and performance discrepancies. Mathematical proof examines and discusses the factors that triggered those variances. As a result, the expected lattice gap and implemented lattice dimensions are mathematically proven as the factors that significantly influenced these attacks' performance. By demonstrating how the attacks manipulated these factors, any lattice-based cryptosystem that relies on the hardness of the CVP could avoid repeating the same slipup as the GGH. Hence, precautionary action could be proactively taken to prevent it from being threatened by embedding-based attacks.","PeriodicalId":43645,"journal":{"name":"Malaysian Journal of Mathematical Sciences","volume":"23 8","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Malaysian Journal of Mathematical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47836/mjms.17.4.09","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MATHEMATICS","Score":null,"Total":0}
引用次数: 0

Abstract

The Goldreich-Goldwasser-Halevi (GGH) cryptosystem is declared broken due to the modified versions of the embedding attacks, known as Nguyen's σ, Nguyen's 2σ and Lee-Hahn's attacks. Despite using the same approach as the original embedding attack, these attacks deployed different strategies and resulted in different performances for breaking the GGH cryptosystem. In this paper, we described those strategies in detail. Moreover, we investigated the mathematical factors behind these attacks' ability and performance discrepancies. Mathematical proof examines and discusses the factors that triggered those variances. As a result, the expected lattice gap and implemented lattice dimensions are mathematically proven as the factors that significantly influenced these attacks' performance. By demonstrating how the attacks manipulated these factors, any lattice-based cryptosystem that relies on the hardness of the CVP could avoid repeating the same slipup as the GGH. Hence, precautionary action could be proactively taken to prevent it from being threatened by embedding-based attacks.
基于嵌入的攻击对基于网格的 GGH 密码系统的影响
Goldreich-Goldwasser-Halevi (GGH) 密码系统由于嵌入攻击的改进版本(即 Nguyen's σ、Nguyen's 2σ 和 Lee-Hahn's 攻击)而被破解。尽管使用了与原始嵌入攻击相同的方法,但这些攻击采用了不同的策略,导致破解 GGH 密码系统的性能不同。在本文中,我们详细介绍了这些策略。此外,我们还研究了这些攻击能力和性能差异背后的数学因素。数学证明研究并讨论了引发这些差异的因素。结果,预期的网格间隙和实施的网格维度被数学证明是显著影响这些攻击性能的因素。通过证明攻击是如何操纵这些因素的,任何依赖于 CVP 难度的基于晶格的密码系统都可以避免重蹈 GGH 的覆辙。因此,可以主动采取预防措施,防止受到基于嵌入的攻击的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.10
自引率
20.00%
发文量
0
期刊介绍: The Research Bulletin of Institute for Mathematical Research (MathDigest) publishes light expository articles on mathematical sciences and research abstracts. It is published twice yearly by the Institute for Mathematical Research, Universiti Putra Malaysia. MathDigest is targeted at mathematically informed general readers on research of interest to the Institute. Articles are sought by invitation to the members, visitors and friends of the Institute. MathDigest also includes abstracts of thesis by postgraduate students of the Institute.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信