簡易檢索 / 詳目顯示

研究生: 賴則霖
Lai, Tse-Lin
論文名稱: 由實作觀點分析格狀攻擊以改良迷袋密碼系統
Empirical Exploration of Lattice Attack for Improvement of Knapsack Cryptosystems
指導教授: 楊家輝
Yang, Jar-Ferr
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 82
中文關鍵詞: 迷袋密碼系統格狀攻擊線性平移迷袋密碼系統
外文關鍵詞: Knapsack cryptosystem, Lattice attack, Linear Shift knapsack cryptosystem
相關次數: 點閱:168下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 迷袋密碼系統為最早被提出的公鑰密碼系統之一,運算效率高為其最主要優勢。近年來量子運算的研究,使安全性基於因數分解與離散對數的公鑰密碼系統,例如:目前廣泛使用的RSA、ECC等系統,可能面臨瓦解危機,但也因此突顯安全性基於迷袋問題之迷袋密碼系統的重要性。然而,迷袋密碼系統自提出以來,即不斷有攻擊出現,其中,以格狀攻擊的影響最為嚴重,大部分的迷袋密碼系統皆無法抵擋此攻擊。過去的文獻透過理論分析,指出此攻擊可破解公鑰密度低於0.9408的迷袋問題,故提高密度成為迷袋密碼系統設計者努力的方向。而在眾多迷袋密碼系統當中,已知線性平移迷袋密碼系統可產生密度高於0.9408之公鑰,理論上應屬安全,但本論文透過實作格狀攻擊,卻證實此系統仍可被破解。因此,本論文首先分析實作與理論預期不符之原因,並透過大規模實驗,分析攻擊中各項變因對於攻擊困難度的影響,再將此結果應用於設計改良型迷袋密碼系統,使之維持迷袋密碼系統之高運作效率特性,並有效提升抵禦格狀攻擊之能力,且能在量子運算架構下,保有公鑰密碼系統之安全性。

    The knapsack problem served as the basis for one of the first viable public-key cryptosystem. Knapsack cryptosystems have the advantages of encryption and decryption speed compared to other public-key cryptosystems. However, security of knapsack cryptosystems has always been a concern. In recent years, research into quantum computing greatly impacted practical public-key cryptosystems constructed on the bases of integer factoring or the discrete logarithm problem, such as RSA and ECC. Interestingly, the knapsack problem remains unaffected by quantum advances. This warrants additional investigation into the resiliency of knapsack. Among all attacks against knapsack, lattice attack is the most critical, and most knapsack cryptosystems cannot prevent it. Coster et al. showed that ciphertexts with public key densities lower than 0.9408 were recoverable using theoretical analysis. Therefore, increasing density became a goal for designing of knapsack cryptosystems.
    Linear Shift knapsack cryptosystem can generate public keys with density higher than 0.9408, and in theory, is supposed to be secure. However, we prove the Linear Shift knapsack cryptosystem is unsecure using a lattice attack implementation. In this paper, we explain the apparent difference between practice and theory. Using extensive experiments, we deduce the impact of lattice attack variables on difficulty of the attack, and find that linear shift can increase the difficulty of lattice attack. Based on the findings, we suggest improvements to the security of knapsack cryptosystems, which increases their ability to protect against lattice attack maintaining quick encryption and decryption speed.

    1. 介紹 1 1.1. 研究動機 1 1.2. 研究貢獻 1 1.3. 論文架構 2 2. 迷袋密碼總觀 3 2.1. 迷袋問題 3 2.2. 迷袋密碼系統 4 2.2.1. Merkle-Hellman迷袋密碼系統 4 2.2.1.1. 加法型系統 5 2.2.1.2. 乘法型系統 6 2.2.2. Chor-Rivest迷袋密碼系統 7 2.2.3. 線性平移(Linear shift)迷袋密碼系統 11 2.2.3.1. 高密度迷袋演算法 12 2.2.3.2. 線性平移演算法 13 2.2.4. OTU迷袋密碼系統 15 3. 現有的迷袋密碼系統安全性分析 19 3.1. 密碼分析概況 19 3.2. 格狀攻擊法 20 3.2.1. 格狀空間基本定義 21 3.2.2. 重要格狀攻擊演算法 22 3.2.3. 格狀基底縮減(Lattice reduction)演算法 29 4. 線性平移迷袋密碼系統之延伸與格狀攻擊實驗 37 4.1. 線性平移迷袋密碼系統之參數研究與變型設計 37 4.1.1. 高密度迷袋演算法之參數選擇研究 38 4.1.1.1. 參數選擇原則 38 4.1.1.2. 參數選擇研究過程 39 4.1.2. 線性平移演算法變型 40 4.2. 格狀攻擊法實作 46 4.2.1. 實作演算法 46 4.2.2. NTL函式庫 47 4.3. 格狀攻擊實驗 49 4.3.1. 實驗建置 49 4.3.2. 實驗結果 49 5. 從實作觀點分析格狀攻擊 53 5.1. 實作與理論不符之現象 53 5.2. 實作情況與理論預期不符之原因 54 5.3. 格狀攻擊的實際效能評估 55 5.3.1. 第一階段實驗:所有變因交叉比較 56 5.3.1.1. 實驗模型 56 5.3.1.2. 實驗結果 57 5.3.2. 第二階段實驗:線性平移次數及參數qi選擇範圍與攻擊困難度之關係 64 6. 根據新的觀點設計迷袋密碼系統 67 6.1. 系統介紹 67 6.2. 系統效能與安全性分析 70 6.3. 總結 74 7. 結論與未來發展 75 7.1. 結論 75 7.2. 未來發展 76 參考資料 79

    [1] L. M. Adleman, "On breaking generalized knapsack public key cryptosystems," in Proc. 15th ACM Symposium on Theory of Computing, pp. 402-412, 1983.
    [2] E. F. Brickell, "Solving low density knapsacks," in Proc. Crypto '83, pp. 25-37, 1984.
    [3] E. F. Brickell, "Breaking iterated knapsacks," in Proc. Crypto '84, pp. 342-358, 1985.
    [4] C. H. Bennett and G. Brassard, "An update on quantum cryptography," in Proc. Crypto '84, pp.475-480, 1985.
    [5] C. H. Bennett, G. Brassard, C. Crepeau and M. H. Skubiszewska, "Practical quantum oblivious transfer," in Proc. Crypto '91, LNCS., vol. 576, pp. 351-366, 1992.
    [6] G. Brassard and C. Crepeau, "Quantum bit commitment and coin tossing protocols," in Proc. Crypto '90, LNCS., vol. 537, pp. 49-61, 1991.
    [7] E. F. Brickell and G. J. Simmons, "A status report on knapsack based public key cryptosystems," in Sandia Nat. Lab. Rep., 1983.
    [8] H. Cohen, "A course in computational algebraic number theory," ISBN:0-387-55640-0, Springer-Verlag, 1993.
    [9] D. Coppersmith, "Fast evaluation of logarithms in fields of characteristic two," in IEEE Transactions on Information Theory, vol. IT-30, pp.587-594, 1984.
    [10] M. J. Coster, A. Joux, B. A. LaMacchia, A. M. Odlyzko, C. P. Schnorr and J. Stern, "Improved low-density subset sum algorithms," in Computational Complexity, vol. 2, pp. 111-128, 1992.
    [11] B. Chor and R. L. Rivest, "A knapsack-type public key cryptosystem based on arithmetic in finite fields," in Proc. Crypto '84, LNCS., pp. 54-65, 1985.
    [12] C. Crepeau and L. Salvail, "Quantum oblivious mutual identification," in Proc. EUROCRYPT '95, LNCS., vol. 921, pp. 133-146, 1995.
    [13] W. Diffie and M. E. Hellman, "New directions in cryptography," in IEEE Transactions on Information Theory, vol. IT-22, pp. 644-654, Nov. 1976.
    [14] Y. G. Desmedt, J. P. Vandewalle and R. J. M. Govaerts, "A general public key cryptographic knapsack algorithm based on linear algebra," in IEEE International Symposium on Information Theory, pp. 129-130, 1983.
    [15] Y. G. Desmedt, J. P. Vandewalle and R. J. M. Govaerts, "A critical analysis of the security of knapsack public key algorithms," in IEEE Transactions on Information Theory, vol. IT-30, pp. 601-611, 1984.
    [16] N. Howgrave-Graham and A. Joux, "New generic algorithms for hard knapsacks," in Proc. EUROCRYPT 2010, LNCS, vol. 6110, pp. 235-256, 2010.
    [17] N. Gama and P. Q. Nguyen, "Predicting lattice reduction," in Proc. EUROCRYPT 2008, LNCS., vol. 4965, pp. 31-51, 2008.
    [18] J. Hoffstein, J. Pipher and J. H. Silverman, "NTRU: A ring-based public key cryptosystem," in Algorithmic Number Theory, LNCS., vol. 1423, pp. 267-288, 1998.
    [19] E. Horowitz and S. Sahni, "Computing partitions with applications to the knapsack problem," in Journal of the ACM, vol. 21, no. 2, pp. 277-292, Apr. 1974.
    [20] T. Izu, J. Kogure, T. Koshiba and T. Shimoyama, "Low-density attack revisited," in Designs, Codes and Cryptography, vol. 43(1), pp. 47-59, 2007.
    [21] R. M. Karp, "Reducibility among combinatorial problems" in Complexity of Computer Computations, pp. 85-104, 1972.
    [22] N. Kunihiro, "New definition of density on knapsack cryptosystems," in Proc. AFRICACRYPT 2008, LNCS., vol. 5023, pp. 156-173, 2008.
    [23] C. S. Laih, J. Y. Lee, L. Harn and Y. K. Su, "Linearly shift knapsack public-key cryptosystem," in IEEE Journal on Selected Areas in Communications, vol. 7, no. 4, May 1989.
    [24] A. K. Lenstra, H. W. Lenstra and L. Lovasz, "Factoring polynomials with rational coefficients," in Mathematische Annalen, vol. 261, no. 4, pp. 515-534, 1982.
    [25] J. C. Lagarias and A. M. Odlyzko, "Solving low density subset sum problems," in Journal of the ACM, vol. 32, pp. 229-246, 1985.
    [26] D. Mayers, "Quantum key distribution and string oblivious transfer in noisy channels," in Proc. Crypto '96, LNCS., vol. 1109, pp. 343-357, 1996.
    [27] D. Micciancio and S. Goldwasser, "Complexity of lattice problems: A cryptographic perspective," Kluwer Academic Publishers, 2002.
    [28] R. Merkle and M. Hellman, "Hiding information and signatures in trapdoor knapsacks," in IEEE Transactions on Information Theory, vol. IT-24, pp. 525-530, Sep. 1978.
    [29] J. E. Mazo and A. M. Odlyzko, "Lattice points in high-dimensional spheres," in Monatshefte Fur Mathematik, vol. 110, pp. 47-61, 1990.
    [30] P. Q. Nguyen and J. Stern, "The two faces of lattices in cryptology," in Cryptography and Lattices Conference, LNCS., vol. 2146, 2001.
    [31] P. Q. Nguyen and J. Stern, "Adapting density attacks to low-weight knapsacks," in Proc. ASIACRYPT 2005, LNCS., vol. 3788, pp. 41-58, 2005.
    [32] P. Q. Nguyen and D. Stehle, "Floating-point LLL revisited," in Proc. EUROCRYPT 2005, LNCS., vol. 3494, pp. 215-233, 2005.
    [33] A. M. Odlyzko, "Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature system," in IEEE Transactions on Information Theory, vol. IT-30, pp. 594-601, 1984.
    [34] A. M. Odlyzko, "The rise and fall of knapsack cryptosystems," in Cryptology and Computational Number Theory, pp. 75-88, 1990.
    [35] T. Okamoto, K. Tanaka and S. Uchiyama, "Quantum public-key cryptosystems," in Proc. Crypto '00, 2000.
    [36] M. Pohst, "A modification of the LLL-algorithm," in Journal of Symbolic Computation, vol. 44(1), Aug. 1987.
    [37] R. C. Pohlig and M. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," in IEEE Transactions on Information Theory, vol. IT-24, pp.106-110, 1978.
    [38] R. Rivest, A. Shamir and L. Adlman, "A method for obtaining digital signatures and public-key cryptosystem," in Communication of the ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    [39] A. Shamir, "A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem," in Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 145-152, Nov. 1982.
    [40] A. Shamir, "Embedding cryptographic trapdoors in arbitrary knapsack systems," in Information Processing Letters, no. 17, pp. 77-79, Aug. 1983.
    [41] P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," in SIAM Journal on Computing, vol. 26, pp. 1484-1509, Oct. 1997.
    [42] C. P. Schnorr and M. Euchner, "Lattice basis reduction: improved practical algorithms and solving subset sum problems," in Mathematical Programming, vol. 66, pp. 181-199, 1994.
    [43] C. P. Schnorr and H. H. Horner, "Attacking the Chor-Rivest cryptosystem," in Proc. EUROCRYPT '95, LNCS., vol. 921, pp.1-12, 1995.
    [44] R. Schroeppel and A. Shamir, "A T = O(2n/2), S = O(2n/4) algorithm for certain NP-complete problems," in 20th Annual IEEE Symposium on Foundations of Computer Science, pp. 328-336, 1979.
    [45] A. Shamir and R. E. Zippel, "On the security of the Merkle-Hellman cryptographic scheme," in IEEE Transactions on Information Theory, vol. IT-26, pp. 339-340, May. 1980.
    [46] S. Vaudenay, "Cryptanalysis of the Chor-Rivest Cryptosystem," in Journal of Cryptology, vol. 14, pp. 87-100, 2001.
    [47] NTL: A Library for doing Number Theory, which is available at http://www.shoup.net/.

    無法下載圖示
    校外:不公開
    電子論文及紙本論文均尚未授權公開
    QR CODE