This paper proposed a new method to attack the NTRU cryptosystem [Hof00a,
Hof98b]. It tried to exploit the public information about the parameters of NTRU
cryptosystem and using the public key, to recover the private keys without delving
in the detail of encryption and decryption. It depended on extant knowledge about
the number of 1’s and -1’s in the private keys coefficients, f and g, which are
used in public key generation. It tried to make use of the polynomial that has
private key coefficients properties. The proposed attack was able to recover a
unique polynomial that represented the private key f and corresponding to private
key g, or their rotations. But, this attack remains expensive in time and depends on
the way of how to start in choice the permutation