Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2019, Issue 18, volume 1, Pages 230–262
DOI: https://doi.org/10.15622/sp.18.1.230-262
(Mi trspy1045)
 

Information Security

Towards unsecurity of two homomorphic encryptions based on residue system

L. K. Babenko, A. V. Trepacheva

Academy for Engineering and Technologies of Southern Federal University
Abstract: The security of two recently proposed symmetric homomorphic encryption schemes based on residue system is analyzed.
Both schemes have a high computational efficiency since using residue system naturally allows parallelizing computations. So they could be good candidates to protect the data in clouds. But to the best of our knowledge there is a lack of security analysis for these encryption schemes.
It should be noted that the first cryptosystem under our consideration was already considered in literature.
The sketch of adaptive chosen-plaintext attack was proposed and estimation of its success was given.
In this paper the attack is analyzed and it is shown that in some cases it may work incorrectly. Also more general algorithm of known-plaintext attack is presented.  Theoretical estimations of probability to recover the key using it and practical estimations of this probability obtained during the experiments are provided.
The security of the second cryptosystem has not been analyzed yet and we fill this gap for known-plaintext attack.  The dependency between the number of «plaintext, ciphertext» pairs required to recover the key and parameters of the cryptosystem is analyzed. Also some recommendations for increasing the security level are provided.
The final conclusion of our analysis is that both cryptosystems are vulnerable to known-plaintext attack. And it may be dangerous to encrypt private data using them.
Finally it should be noted that the key element of the proposed attacks is the algorithm of computing the greatest common divisor. So their computational complexity depends polynomially on the size of input data.
Keywords: homomorphic encryption, cloud computing, cryptanalyzis, known-plaintext attack, residue number system.
Funding agency Grant number
Ministry of Education and Science of the Russian Federation 2.6264.2017/8.9
This research is supported by Russian Ministry of Education and Science~(grant no.~2.6264.2017/8.9).
Received: 25.08.2018
Bibliographic databases:
Document Type: Article
UDC: 003.26.09
Language: Russian
Citation: L. K. Babenko, A. V. Trepacheva, “Towards unsecurity of two homomorphic encryptions based on residue system”, Tr. SPIIRAN, 18:1 (2019), 230–262
Citation in format AMSBIB
\Bibitem{BabTre19}
\by L.~K.~Babenko, A.~V.~Trepacheva
\paper Towards unsecurity of two homomorphic encryptions based on residue system
\jour Tr. SPIIRAN
\yr 2019
\vol 18
\issue 1
\pages 230--262
\mathnet{http://mi.mathnet.ru/trspy1045}
\crossref{https://doi.org/10.15622/sp.18.1.230-262}
\elib{https://elibrary.ru/item.asp?id=37286138}
Linking options:
  • https://www.mathnet.ru/eng/trspy1045
  • https://www.mathnet.ru/eng/trspy/v18/i1/p230
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:236
    Full-text PDF :175
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024