%0 Journal Article
%T A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information
%J Engineering and Technology Journal
%I University of Technology-Iraq
%Z 1681-6900
%A Monem S.Rahma, Abdul
%A Mohammed Hussein, Qasim
%D 2010
%\ 03/01/2010
%V 28
%N 6
%P 1061-1072
%! A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information
%K cryptosystem
%K NTRU
%K Public Key
%K Attack
%R 10.30684/etj.28.6.3
%X This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,Hof98b]. It tried to exploit the public information about the parameters of NTRUcryptosystem and using the public key, to recover the private keys without delvingin the detail of encryption and decryption. It depended on extant knowledge aboutthe number of 1’s and -1’s in the private keys coefficients, f and g, which areused in public key generation. It tried to make use of the polynomial that hasprivate key coefficients properties. The proposed attack was able to recover aunique polynomial that represented the private key f and corresponding to privatekey g, or their rotations. But, this attack remains expensive in time and depends onthe way of how to start in choice the permutation
%U https://etj.uotechnology.edu.iq/article_27175_858ff68478d94f0d3f9a91edd88cdc32.pdf