DOI QR코드

DOI QR Code

A Study on NTRUSign security to prevent script attacks

스크립트 공격을 막기 위한 NTRUSign 보안 연구

  • Bae, Sung-Hyun (Dept. of Aviations Information & Communication, KyungWoon University) ;
  • Jeong, Jong-hyeog (Dept. of Aviations Information & Communication, KyungWoon University)
  • Received : 2019.03.10
  • Accepted : 2019.03.21
  • Published : 2019.03.31

Abstract

Recently, there is a growing preference for a fast and secure cryptographic protocol that is applicable to Internet of things environments. Among the lattice-based cryptographic algorithms, the NTRU cryptosystem is secure by virtue of the shortest vector problem (SVP) and the closest problem(CVP), which is a problem of finding very short vectors and closest vector. NTRUSign, an electronic signature based on this cryptographic algorithm, has been proposed and proved unsafe for script attacks. In this paper, we propose a security protocol using a symmetric key algorithm by securing a shared key using key exchange. Therefore, the attacker can not compute the key value and intends to propose a more secure digital signature.

최근 사물인터넷 환경에서 적용가능하며 빠르고 보안성이 뛰어난 암호프로토콜에 대한 선호도가 높아지고 있다. 래티스 기반의 암호알고리즘 중 NTRU 암호시스템은 매우 짧은 벡터를 찾는 문제인 SVP와 가장 가까운 벡터를 찾는 문제인 CVP에 의해 안전하다. 이 암호알고리즘의 안전성에 근거한 전자서명인 NTRUSign이 제안되었으며 스크립트 공격에 대해 안전하지 않음이 밝혀졌다. 본 논문에서는 키 교환을 사용하여 공유 키를 확보하고 대칭 키 알고리즘을 사용한 보안 프로토콜을 제안한다. 따라서 공격자는 키 값을 계산할 수 없으며 보다 안전한 디지털 서명을 제안하고자 한다.

Keywords

JGGJB@_2019_v23n1_200_f0001.png 이미지

Fig. 1. NTRUSign signing. 그림 1. NTRUSign 서명과정

JGGJB@_2019_v23n1_200_f0002.png 이미지

Fig. 2. key generation. 그림 2. 키생성 과정

JGGJB@_2019_v23n1_200_f0003.png 이미지

Fig. 3. signing and Verification. 그림 3. 서명 및 확인 과정

Table 1. notation description. 표 1. 사용된 표기법

JGGJB@_2019_v23n1_200_t0001.png 이미지

References

  1. J. H. stein, J. Pipher, J. H. Silverman, "NTRU: A new high speed public key cryptosystem," preprint; presented at the rump session of CRYOTO '96, 1996.
  2. J. Hoffstein, J. Pipher, J. H. Silverman, "NTRU: A Ring Based Public Key Cryptosystem, in Algorithmic Number Theory," (ANTSIII), Portland, J. P. Buhler (ed.), Lecture Notes in Computer Science 1423, Springer-Verlag, pp. 267-288, 1998. DOI: 10.1007/BFb0054868
  3. J. Hoffstein, J. Pipher, J. H. Silverman, "NSS: An NTRU Lattice-Based Signature Scheme," EUROCRYPT 2001 Proceeding, Lecture Notes in Computer Science, Springer - Verlag, pp. 211-228, 2001. DOI: 10.1007/3-540-44987-6_14
  4. A. May "Cryptanalysis of NTRU," at http://www.informatik.uni-frankfurt.de/alex/crypto.html, 1999.
  5. Hoffstein, J., Graham, N. A. H., Pipher, J., Silverman, J. H., and Whyte, W., "NTRUSign: Digital signatures using the NTRU lattice," In Proceeding of CT-RSA, vol 2612 of Lecture Notes in Computing Sci. pages 122-140. Springer-Verlag, 2003. DOI: 10.1007/3-540-36563-X_9
  6. Hyunmi Park, Sang-Seung Kang, Young-Keun Choi, Soonja Kim, "Authentication in NT RU-based Mobile Communication And Key Agreement Protocol," Journal of the Korea Institute of Information Security and Cryptology, vol. 12, no. 3, pp. 49-59, 2002.
  7. C. Gentry, J. Jonsson, J. Stern, M. Szydlo "Cryptoanalysis of the NTRU Signature Schem e (NSS) from EUROCRYPT 2001," Advances in Cryptology-ASIACRYPT 2001, Lecture Notes in Computer Science 2048, Springer - Verlag, pp. 1-20, 2001.
  8. C. Gentry, "Key Recovery and Message Attacks on NTRU-Composite," Advances in Cryptology-EUROCRYPT 2001 Proceeding, Lecture Notes in Computer Science 2045, Springer-Verlag, pp. 182-194, 2001. DOI: 10.1007/3-540-44987-6_12
  9. C. Gentry, M. Szydlo "Analysis of the Revised NTRU signature scheme R-NSS," at " http://www.szydlo.net," Full version, 2002.
  10. A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, "Handbook of Applied Cryptography," CRC Press, 1996.
  11. J. H. Silverman, "Estimated breaking tim es for NTRU lattices," NTRU Cryptosystems T echnical Report # 012 at http://www.ntru.com/cryptolab/tech_notes.htm
  12. D. Coppersmith, Adi. Shamir "Lattice Attacks on NTRU," Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science 1233, Springer-Verlag, pp. 52-61, 1997. DOI: 10.1007/3-540-69053-0_5
  13. Sung-hyun Bae, Sungmin Hwang, Young-Keun Choi, Soonja Kim, "Improved NTRUSign protocol," proceeding of the Korea Institute of Information Security and Cryptology, 2002.
  14. Sung-hyun Bae, "The improvement of the NTRUSign using the key exchange," Master thesis, Kyungpook National University. 2003.