![](bg5.png)
and when d<0.9408, the rate of effective attack is
very high. The attack can use lattice as follows:
1
1...
...
... 1
11
...
22
n
Oms
Oms
mS
Among them, select the suitable integer m,
satisfies m>
1
2
n . The dimension lattice of the
matrix is (n+ 1),
S=
1
n
ii
i
sx
. Considering the
infinite extension: Let’s make it that the size of s
i
is L bits, suppose the size of a is similar with s,
which is also L bits. According to p>
1
n
i
i
a
, the
size of modulus p is L + log
2
n, when L>n-log
2
n,
then d>1, that is Cp can defend LDA attack; For
the similar reason, Cq can defend LDA attack.
4.3 Some Comparison to the Original
Algorithm
1) The original algorithm has some restrictive
conditions to produce a certain backpack vector:
select n parameters from U = (14,17,19,
22,23,26,28,29,30,31,34,37,38,39,40, 41,42,43,44,
46,47,48)
to further generate backpack vector.
This brought the key space so small, although
the parameters selected from the U should be
multiplied with the random parameter h before
it's used to be the knapsack vector S, it can not be
eliminated that the key constraints on U, because
the elements of S will be the multiples of the
corresponding elements of U. In the improved
algorithm, knapsack vector is generated from the
multiplication of two completely random numbers,
so the key security issues of original algorithm is
well solved.
2) The improved algorithm is based on the ease of
solution of the original algorithm knapsack
problem, so the efficiency of encryption and
decryption are equal to the original
algorithm.
There is a problem
that the speed of decryption is
slow
in this algorithm and the original one. We
can see the efficiency between this algorithm and
the traditional RSA(Rivcs, Gau & Adlcman 1978,
p.120) and other mode refers to operation is more
or less the same, which is made by the complexity
of making knapsack problem. In addition, the
original algorithm generates knapsack vector
quickly at the expense of the key security.
Although the security of the key algorithm has
been required higher in the improved algorithm,
the terms 0 ≤ x ≤ k-1 should be met still, so there
are still some limitations during the key
generating.
5 CONCLUSION AND PROSPECT
This paper introduces the basic theory of
knapsack-type public key cryptography, and the
strongest attacking method to this public key
cryptography. Then, the article analysis the
literature(Wang & Hu 2006, p.2930), pointing out
the potential defects of the security of secret key,
and gives the improved method, discusses its
safety and efficiency, and finally obtains the
conclusion that on the premise of same efficiency,
the safety is better than the original algorithm.
ACKNOWLEDGEMENTS
This work is supported by Aero-Science Fund of
China (2009ZD53045), and Innovation Project of
Northwestern Polytechnic University (W016141).
AN IMPROVED HIGH-DENSITY KNAPSACK-TYPE PUBLIC KEY CRYPTOSYSTEM
131