Comments on a Cryptosystem Proposed by Wang and Hu

In this paper, we analyze a new proposal for a knapsack-type cryptosystem, recently published by Wang and Hu ([1]), along with two cryptanalyses of it, carried out by Youssef ([2]) and Lee ([3]). The cryptosystem proves to be safe only if the keys have very large sizes, but this severely impacts the use of the system from a practical point of view.

[1]  Václav Snásel,et al.  Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments , 2012, Inf. Sci..

[2]  Manas Ranjan Patra,et al.  Network intrusion detection system: A machine learning approach , 2011, Intell. Decis. Technol..

[3]  Yupu Hu,et al.  Quadratic compact knapsack public-key cryptosystem , 2010, Comput. Math. Appl..

[4]  Yupu Hu,et al.  A knapsack-based probabilistic encryption scheme , 2007, Inf. Sci..

[5]  Álvaro Herrero,et al.  A Neural-Visualization IDS for Honeynet Data , 2012, Int. J. Neural Syst..

[6]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[7]  Moon Sung Lee Cryptanalysis of a quadratic compact knapsack public-key cryptosystem , 2011, Comput. Math. Appl..

[8]  Adi Shamir,et al.  A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[9]  Phong Q. Nguyen,et al.  The LLL Algorithm - Survey and Applications , 2009, Information Security and Cryptography.

[10]  T. Apostol Introduction to analytic number theory , 1976 .

[11]  Ian Goldberg,et al.  Generalizing cryptosystems based on the subset sum problem , 2011, International Journal of Information Security.

[12]  Marc M. Van Hulle,et al.  Enhancing the Yield of High-Density electrode Arrays through Automated electrode Selection , 2012, Int. J. Neural Syst..

[13]  Amr M. Youssef,et al.  Cryptanalysis of a knapsack-based probabilistic encryption scheme , 2009, Inf. Sci..

[14]  László Lovász,et al.  Factoring polynomials with rational coefficients , 1982 .

[15]  Amr M. Youssef Cryptanalysis of a quadratic knapsack cryptosystem , 2011, Comput. Math. Appl..

[16]  Álvaro Herrero,et al.  Neural visualization of network traffic data for intrusion detection , 2011, Appl. Soft Comput..

[17]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[18]  Jaime Muñoz Masqué,et al.  Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range , 2009, Inf. Sci..