How to break Okamoto's cryptosystem by reducing lattice bases

  • Authors:
  • B. Vallée;M. Girault;P. Toffin

  • Affiliations:
  • Univ. Caen Cedex, France;Service d'Etudes communes des Postes et Telecommunications, Caen Cedex, France;Univ. Caen Cedex, France

  • Venue:
  • Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
  • Year:
  • 1988

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security of several signature schemes and cryptosystems, essentially proposed by Okamoto, is based on the difficulty of solving polynomial equations or inequations modulo n. The encryption and the decryption of these schemes are very simple when the factorisation of the modulus, a large composite number, is known.We show here that we can, for any odd n, solve, in polynomial probabilistic time, quadratic equations modulo n, even if the factorisation of n is hidden, provided we are given a sufficiently good approximation of the solutions. We thus deduce how to break Okamoto's second degree cryptosystem and we extend, in this way, Brickell's and Shamir's previous attacks.Our main tool is lattices that we use after a linearisation of the problem, and the success of our method depends on the geometrical regularity of a particular kind of lattices.Our paper is organized as follows: First we recall the problems already posed, their partial solutions and describe how our results solve extensions of these problems. We then introduce our main tool, lattices and show how their geometrical properties fit in our subject. Finally, we deduce our results. These methods can be generalized to higher dimensions.