Knapsack cryptosystems built on NP-hard instance

We construct three public key knapsack cryptosystems. Standard knapsack cryptosystems hide easy instances of the knapsack problem and have been broken. The systems considered in the article face this problem: They hide a random (possibly hard) instan…

Authors: Laurent Evain

Knapsac k cryptosys tems built on NP-hard instances Lauren t Ev ain (lauren t.ev ain@univ-ang ers.fr) Abstract: W e construct three public key knapsack cry ptosystems. Standard knapsack cr y ptosystems hide easy instances of the knapsa ck problem and hav e been broken. The sy s tems considered in the a rticle face this problem: T he y hide a random (p ossibly har d) insta nce of the knapsack problem. W e pr ovide b oth complexity results (size of the key , t ime needed to encypher/decypher...) and exper imen tal results. Security r esults a re given for the s e c ond cryptos ystem ( the fas test one and the o ne with the shortest key). Probabilistic p olynomial r eductions show that finding the priv a te key is a s difficult as factorizing a pr o duct o f tw o primes. W e also consider heuristic atta cks. First, the density o f the cr yptosystem can be chosen ar bitrarily close to o ne, disca r ding low density attacks. Finally , we consider explicit heur istic attacks bas e d on the LLL a lgorithm and we prove that with resp ect to these attacks, the public key is as secure a s a rando m key . In tro duction The principle It is natural to build cryptosy stems rely ing on NP- complete pro blems since NP- c omplete problems are presumably difficult to solve. Ther e are several versions of knapsack pr oblems, all of them b eing NP - complete. Several c r yptosystems relying on k napsack pr oblems hav e been in tro duced in the eigh ties [9] W e are interested in the b ounded version of the knapsa ck problem. Let s, M , v , v 1 , . . . , v s ∈ N . The problem is to determine whether there are integers ǫ i , 0 ≤ ǫ i < M such that P i = s i =1 ǫ i v i = v . In cas e M = 2, the problem is to fill a knapsack of volume v with ob jects of volume v i . Knapsack c r yptosystems are built o n knapsack problems. Alice co ns tructs integers v i (using some priv ate key q ) such tha t the cyphering ma p C is injectiv e: C : { 0 , . . . , M − 1 } s → N , ( ǫ i ) 7→ P ǫ i v i . The sequence v i is the public key . When Bob has a plaintext mess age m ∈ { 0 , . . . , M − 1 } s for Alice, he sends the ciphertext C ( m ). Alice deco des using her priv ate key . Strength an d wea kness of kna psac k cryptosystems The main adv antage of knapsack cryptosystems is the sp eed. T hes e systems attain very high encryption and decryption rates. The knapsack cryptos ystem pr op osed by Merkle - Hellman [7] see med to b e 100 times faster tha n RSA for the same level o f s ecurity at the time it was in tro duced [9]. The main w e akness of k napsack cryptosystems is security . All standa rd knapsack cryptosystems have bee n broken: the Merkle-Hellman cryptosystem by Shamir and Adleman [1 1], , the iter ated Merkle- Hellmann by Br ickell [3] , the Chor-Rivest cr yptosystem by V a udenay in 1 9 97 [12] ... Two main rea sons ex plain the frag ilit y of kna psack cryptosys tems . First, mos t of these cryptosys tems star t with an easy instance. The knapsk ack p ro blem is NP- complete and no fast alg orithm to solve it is known in general. Ho wev er, the knapsack pro blem is easy 1 to solve for so me ins tances ( v i ) i ≤ s : if ( v i ) is a sup erincreas ing sequence in the sense that v i > P j