New attacks for knapsack based cryptosystems

  • Authors:
  • Gottfried Herold;Alexander Meurer

  • Affiliations:
  • Horst Görtz Institut für IT-Sicherheit, Ruhr-Universität Bochum, Germany;Horst Görtz Institut für IT-Sicherheit, Ruhr-Universität Bochum, Germany

  • Venue:
  • SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we revisit Shamir's well-known attack (and a variant due to Lagarias) on the basic Merkle-Hellman Knapsack cryptosystem (MH scheme). The main observation is that the superincreasing property of the secret key sequence $\boldsymbol{\mathfrak{a}}$ used in the original MH construction is not necessary for the attack. More precisely, the attack is applicable as long as there are sufficiently many secret key elements $\mathfrak{a}_i$ whose size is much smaller than the size of the secret modulus M. We then exploit this observation to give practical attacks on two recently introduced MH-like cryptosystems. Both schemes are particularly designed to avoid superincreasing sequences but still provide enough structure to allow for complete recovery of (equivalent) decryption keys. Similarly to Shamir's attack, our algorithms run in two stages and we need to solve different fixed-dimensional simultaneous Diophantine approximation problems (SDA). We implemented the attacks in Sage and heuristically solved the SDA by lattice reduction. We recovered secret keys for both schemes and various security levels in a matter of seconds.