On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis

Guilhem Castagnos 1, 2 Fabien Laguillaumie 2
2 Equipe AMACC - Laboratoire GREYC - UMR6072
GREYC - Groupe de Recherche en Informatique, Image, Automatique et Instrumentation de Caen
Abstract : We describe the first polynomial time chosen-plaintext to-tal break of the NICE family of cryptosystems based on ideal arith-metic in imaginary quadratic orders, introduced in the late 90's by Hart-mann, Paulus and Takagi [HPT99]. The singular interest of these en-cryption schemes is their natural quadratic decryption time procedure that consists essentially in applying Euclid's algorithm. The only current specific cryptanalysis of these schemes is Jaulmes and Joux's chosen-ciphertext attack to recover the secret key [JJ00]. Originally, Hartmann et al. claimed that the security against a total break attack relies only on the difficulty of factoring the public discriminant ∆q = −pq 2 , although the public key was also composed of a specific element of the class group of the order of discriminant ∆q, which is crucial to reach the quadratic decryption complexity. In this article, we propose a drastic cryptanalysis which factors ∆q (and hence recovers the secret key), only given this element, in cubic time in the security parameter. As a result, performing our cryptanalysis on a cryptographic example takes less than a second on a standard PC.
Complete list of metadatas

Cited literature [22 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01082343
Contributor : Greyc Référent <>
Submitted on : Thursday, November 13, 2014 - 11:49:50 AM
Last modification on : Thursday, February 7, 2019 - 5:29:43 PM
Long-term archiving on : Friday, April 14, 2017 - 2:37:03 PM

File

ACTI-CASTAGNOS-2009-3.pdf
Files produced by the author(s)

Identifiers

Citation

Guilhem Castagnos, Fabien Laguillaumie. On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Dec 2009, Tokyo, Japan. pp.260 - 277, ⟨10.1007/978-3-642-01001-9_15⟩. ⟨hal-01082343⟩

Share

Metrics

Record views

162

Files downloads

184