First-order collision attack on protected NTRU cryptosystem

Xuexin Zheng, An Wang*, Wei Wei

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

20 Citations (Scopus)

Abstract

NTRU cryptosystem has been widely used in microsystems with low performance in computation. In 2010 Lee et al. gave several power analysis attacks on NTRU and three countermeasures, where they argued that only second-order power analysis can break their first countermeasure, and the combination of the first and third countermeasure is secure. In this paper we give efficient first-order collision attacks against all their countermeasures. Besides a gain of 108.4% and 78% in efficiency, our attacks cannot be avoided by any padding scheme. Furthermore, we discuss some countermeasures preventing our attacks.

Original languageEnglish
Pages (from-to)601-609
Number of pages9
JournalMicroprocessors and Microsystems
Volume37
Issue number6-7
DOIs
Publication statusPublished - 2013
Externally publishedYes

Keywords

  • Collision attack
  • Countermeasure
  • Cryptography
  • NTRU
  • Power analysis attack

Fingerprint

Dive into the research topics of 'First-order collision attack on protected NTRU cryptosystem'. Together they form a unique fingerprint.

Cite this