Lattice reduction (LR) is a powerful technique for improving the performance of suboptimum MIMO data detection methods. For LR-assisted data detection, the lll algorithm has been considered almost exclusively so far. ...
详细信息
ISBN:
(纸本)1424407281
Lattice reduction (LR) is a powerful technique for improving the performance of suboptimum MIMO data detection methods. For LR-assisted data detection, the lll algorithm has been considered almost exclusively so far. In this paper, we propose and develop the application of Seysen's algorithm (SA) to LR-assisted MIMO detection, and we show that the SA is a promising alternative to, the lll algorithm. Specifically, the SA outperforms the lll algorithm in that it finds better lattice bases for MIMO systems of practical interest, which is reflected by an improved performance of SA-assisted detectors relative to their lll-assisted counterparts. We present an efficient implementation of the SA whose per-iteration complexity is linear in the number of antennas, and we demonstrate that the SA requires significantly fewer iterations than the lll algorithm.
We propose RCPKC, a random congruential public key cryptosystem working on integers modulo q, such that the norm of a two-dimensional vector formed by its private key, (f;g), is greater than q. RCPKC works similar to ...
详细信息
ISBN:
(纸本)9781728128825
We propose RCPKC, a random congruential public key cryptosystem working on integers modulo q, such that the norm of a two-dimensional vector formed by its private key, (f;g), is greater than q. RCPKC works similar to NTRU, the fastest and secure PKC. NTRU, uses high order, N, polynomials and is susceptible to the lattice basis reduction attack (LBRA) taking time exponential in N. RCPKC is a secure version of insecure CPKC proposed by NTRU authors and easily attackable by LBRA since CPKC uses small numbers for the sake of the correct decryption. RCPKC specifies a range from which the random numbers shall be selected, it provides correct decryption for valid users and incorrect decryption for an attacker using Gaussian Lattice Reduction (GLR). Because of its resistance to LBRA, RCPKC is more secure, and, due to the use of big numbers instead of high order polynomials, about 24 (7) times faster in encryption (decryption) than NTRU. Also, RCPKC is more than 3 times faster than the most effective known NTRU variant, BQTRU.
This paper proposes an improved lattice-reduction aided (IRA) MMSE detection based on the Gram-Schmidt (GS) procedure. The proposed detection reduces the column vectors of the MIMO channel matrix using the lll algorit...
详细信息
ISBN:
(纸本)9781424441471
This paper proposes an improved lattice-reduction aided (IRA) MMSE detection based on the Gram-Schmidt (GS) procedure. The proposed detection reduces the column vectors of the MIMO channel matrix using the lll algorithm and the GS procedure to create mutually purely orthogonal column vectors of the reduced channel matrix. Then the decision boundary becomes the same as that for the ML detection. Compared to the conventional LRA MMSE detector, the proposed detector achieves much closer BER performances to those for the ML detector in both the 4x4 MIMO and the 8x8 MIMO systems.
Computing the shortest vector in a lattice has many applications in computer science and engineering such as in cryptography, coding theory, and quantum computing. One of the best known algorithms for computing such s...
详细信息
Computing the shortest vector in a lattice has many applications in computer science and engineering such as in cryptography, coding theory, and quantum computing. One of the best known algorithms for computing such shortest vectors is the Lenstra, Lenstra and Lovasz (lll) algorithm. Unfortunately the lll algorithm has a worst-case exponential running time, and its practical performance depends heavily on the lattice structure. In this paper, we propose an efficient implementation of the Alternating Direction Method of Multipliers for finding the shortest vector in a lattice. Our algorithm is an improved stochastic version of the ADMM algorithm proposed by Takapoui, Moehle, Boyd and Bemporad. The performance of our method is illustrated via extensive numerical experiments on various lattice structures. The numerical results show that our method significantly outperforms the lll algorithm in terms of running time and solution quality.
We present several attacks on a variant of RSA due to Takagi when different parts of the private exponent are known to an attacker. We consider three cases when the exposed bits are the most significant bits, the leas...
详细信息
ISBN:
(纸本)9783319075365;9783319075358
We present several attacks on a variant of RSA due to Takagi when different parts of the private exponent are known to an attacker. We consider three cases when the exposed bits are the most significant bits, the least significant bits and the middle bits of the private exponent respectively. Our approaches are based on Coppersmith's method for finding small roots of modular polynomial equations. Our results extend the results of partial key exposure attacks on RSA of Ernst, Jochemsz, May and Weger (EUROCRYPT 2005) for moduli from N = pq to N = p(r)q (r >= 2).
In Crypto 2010, Kiltz, O'Neill and Smith used m-prime RSA modulus N with m >= 3 for constructing lossy RSA. The security of the proposal is based on the Multi-Prime Phi-Hiding Assumption. In this paper, we prop...
详细信息
ISBN:
(纸本)9783319458717;9783319458700
In Crypto 2010, Kiltz, O'Neill and Smith used m-prime RSA modulus N with m >= 3 for constructing lossy RSA. The security of the proposal is based on the Multi-Prime Phi-Hiding Assumption. In this paper, we propose a heuristic algorithm based on the Herrmann-May lattice method (Asiacrypt 2008) to solve the Multi-Prime Phi-Hiding Problem when prime e > N-2/3m. Further, by combining with mixed lattice techniques, we give an improved heuristic algorithm to solve this problem when prime e > N2/3m-1/4m2. These two results are verified by our experiments. Our bounds are better than the existing works.
RSA-like cryptosystems, based on the original RSA algorithm, are gaining attention as potential alternatives to traditional techniques. They offer better security, efficiency, flexibility, and compatibility in cryptog...
详细信息
ISBN:
(纸本)9798350386851;9798350386844
RSA-like cryptosystems, based on the original RSA algorithm, are gaining attention as potential alternatives to traditional techniques. They offer better security, efficiency, flexibility, and compatibility in cryptography. However, recent studies have uncovered vulnerabilities in these variants, particularly to Wiener-type attacks, despite initial expectations of security comparable to RSA. In this paper, we further investigate the security vulnerabilities of a variant of this technique, namely the Murru-Saettone (MS) cryptosystem. Our investigation employs lattice-based attacks to exploit weaknesses in systems with small private keys. It demonstrates that if the private exponent is smaller than N-1/4, where N is the product of two distinct balanced primes, the small exponent of the cryptosystem can be recovered.
This paper proposes a combined forward and backward lattice-reduction aided detection scheme to improve estimation of transmitted signals in lattice-reduction aided (LRA) MMSE MIMO systems. The cross-cor relation betw...
详细信息
ISBN:
(纸本)9781424426805
This paper proposes a combined forward and backward lattice-reduction aided detection scheme to improve estimation of transmitted signals in lattice-reduction aided (LRA) MMSE MIMO systems. The cross-cor relation between the forward and the backward reduced channel matrices is also analyzed to make sure that the proposed detector achieves more reliable estimates. The proposed detector achieves much better BER performance than the conventional LRA detector in the 4x4 and the W MIMO systems. It is also shown that the achieved BER curve moves closer to the curve of the ML detector than that of the conventional LRA MMSE detector.
Padovan and Perrin sequences are ternary recurrent sequences that satisfy the same relation w(n) = w(n-2 )+ w(n-3) with different initial conditions (w(0), w(1), w(2)) = (1, 1, 1) and (3, 0, 2), respectively. In this ...
详细信息
Padovan and Perrin sequences are ternary recurrent sequences that satisfy the same relation w(n) = w(n-2 )+ w(n-3) with different initial conditions (w(0), w(1), w(2)) = (1, 1, 1) and (3, 0, 2), respectively. In this study we compute all pairs of Padovan and Perrin numbers that are multiplicatively dependent.
We introduce a "generalized small inverse problem (GSIP)" and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x(0), x(1), . . , x(n)) = x(0)h(x(1), . . . , x...
详细信息
ISBN:
(纸本)9783642140808
We introduce a "generalized small inverse problem (GSIP)" and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x(0), x(1), . . , x(n)) = x(0)h(x(1), . . . , x(n)) + C = 0(mod M) for an n-variate polynomial h, non-zero integers C and M. Our algorithm is based on lattice-based Coppersmith technique. We provide a strategy for construction of a lattice basis for solving f = 0, which are systematically transformed from a lattice basis for solving h = 0. Then, we derive an upper bound such that the target problem can be solved in polynomial time in log M in an explicit form. Since GSIPs include some RSA-related problems, our algorithm is applicable to them. For example, the small key attacks by Boneh and Durfee are re-found automatically.
暂无评论