TY - GEN
T1 - Knapsack cryptosystems and unreliable reliance on density
AU - Jen, Shang Ming
AU - Lai, Tse Lin
AU - Lu, Chia Yu
AU - Yang, Jar Ferr
PY - 2012/5/14
Y1 - 2012/5/14
N2 - With the possible advent of quantum computers, the most famous public key cryptosystem for network applications - RSA, is facing critical challenges in the near future. A replacement might be knapsack cryptosystems, which do not yield any benefits to quantum computation. Before making knapsack cryptosystems suitable for applications, it is necessary to guarantee their security. At present, the most significant challenge towards knapsack cryptosystems is lattice attacks. Public key density has historically been used to measure the security of the knapsack cryptosystems against these lattice attacks. However, an acceptably dense knapsack cryptosystem was broken using lattice attack implementation in our research. In order to study the security of knapsack cryptosystems against lattice attacks, we design a series of experiments to analyze these factors. We conclude it is not appropriate to assess knapsack cryptosystem security by simply considering density. From our results, we provide suggested directions for knapsack cryptosystem developers.
AB - With the possible advent of quantum computers, the most famous public key cryptosystem for network applications - RSA, is facing critical challenges in the near future. A replacement might be knapsack cryptosystems, which do not yield any benefits to quantum computation. Before making knapsack cryptosystems suitable for applications, it is necessary to guarantee their security. At present, the most significant challenge towards knapsack cryptosystems is lattice attacks. Public key density has historically been used to measure the security of the knapsack cryptosystems against these lattice attacks. However, an acceptably dense knapsack cryptosystem was broken using lattice attack implementation in our research. In order to study the security of knapsack cryptosystems against lattice attacks, we design a series of experiments to analyze these factors. We conclude it is not appropriate to assess knapsack cryptosystem security by simply considering density. From our results, we provide suggested directions for knapsack cryptosystem developers.
UR - http://www.scopus.com/inward/record.url?scp=84860742838&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84860742838&partnerID=8YFLogxK
U2 - 10.1109/AINA.2012.43
DO - 10.1109/AINA.2012.43
M3 - Conference contribution
AN - SCOPUS:84860742838
SN - 9780769546513
T3 - Proceedings - International Conference on Advanced Information Networking and Applications, AINA
SP - 748
EP - 754
BT - Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012
T2 - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012
Y2 - 26 March 2012 through 29 March 2012
ER -