skip to main content
10.1145/800061.808771acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

On breaking generalized knapsack public key cryptosystems

Published:01 December 1983Publication History

ABSTRACT

In this paper new methods, generalizing those of Shamir, are presented for attacking generalizations of the basic system. It is shown how these methods may be applied to the Graham-Shamir public-key crypto-system [2], and the iterated Merkle-Hellman public-key cryptosystem. We are unable to present a rigorous proof that the attacks presented here are effective. However, in the case of the Graham-Shamir system, the methods have been implemented and have performed well in tests.

The method of attack uses recent results of Lenstra, Lenstra, and Lovasz [5]. The cryptanalytic problem is treated as a lattice problem rather than a linear programming one as in Shamir's result.

References

  1. 1.W. Diffie, and N. Hellman, New Directions in Cryptography, IEEE Trans: Information Theory, IT-22-6, November, 1976.Google ScholarGoogle Scholar
  2. 2.A. Lempel, Cyrptology in Transition: A Survey, Program 134-45-90, Discrete Mathematics Department, Digital Techniques Laboratory, Sperry Research Center (1978).Google ScholarGoogle Scholar
  3. 3.Lagarias, J., Knapsack-Type Public Key Cryptosystems and Dcophantine Approximation, (abstract).Google ScholarGoogle Scholar
  4. 4.J. Lagarias, The Computational Complexity of Simultaneous Dcophantine Approximation Problems, Proceedings 23rd Foundations of Computer Science Conference (1982) pg. 32.Google ScholarGoogle Scholar
  5. 5.A.K. Lenstra, H.W. Lenstra, Jr., and L. Lovasz, Factoring Polynomials with Rational Coefficients, Report 82-05, Mathematics Institute, University of Amsterdam, March 1982.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6.K.L. Manders and L. Adleman, NP-Complete Decision Problems for Binary Quadratics, J. Computer and Systems Science 16 (1978), 168-184.Google ScholarGoogle ScholarCross RefCross Ref
  7. 7.R. Merkle, N. Hellman, Hiding Information and Signatures in Trapdoor Knapsacks, IEEE Trans. Information Theory, IT-24-5, September, 1978.Google ScholarGoogle Scholar
  8. 8.A. Shamir, A Polynomial Time Algorithm for Breaking Merkle-Hellman Cryptosystems, Proceedings 23rd Foundations of Computer Science Conference (1982).Google ScholarGoogle Scholar
  9. 9.R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, CACM 21-2, February, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On breaking generalized knapsack public key cryptosystems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC '83: Proceedings of the fifteenth annual ACM symposium on Theory of computing
            December 1983
            487 pages

            Copyright © 1983 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 December 1983

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,469of4,586submissions,32%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader