Abstract
The Knapsack Cryptosystem of Merkle and Hellman, 1978, is one of the earliest public-key cryptography schemes. The security of the method relies on the difficulty in solving Subset Sum Problems (also known as Knapsack Problems). In this paper, we first provide a brief history of knapsack-based cryptosystems and their cryptanalysis attacks. Following that, we review the advances in integer programming approaches to 0 − 1 Knapsack Problems, with a focus on the polyhedral studies of the convex hull of the integer set. Last of all, we discuss potential future research directions in applying integer programming in the cryptanalysis of knapsack ciphers.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
AbdulHalim, M.F., Attea, B.A., Hameed, S.M.: A binary particle swarm optimization for attacking knapsacks cipher algorithm. In: International Conference on ICCCE 2008, pp. 77–81 (May 2008)
Achterberg, T., Koch, T., Martin, A.: MIPLIB 2003. Oper. Res. Lett. 34(4), 361–372 (2006)
Adleman, L.M.: On breaking generalized knapsack public key cryptosystems. In: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, STOC 1983, pp. 402–412. ACM, NY (1983)
Al-Dabbagh, R.D.H.: Compact genetic algorithm for cryptanalysis trapdoor 0-1 knapsack cipher. Journal of Al-Nahrain University 12(2), 137–145 (2009)
Balas, E.: Facets of the knapsack polytope. Math. Prog. 8(1), 146–164 (1975)
Balas, E., Zemel, E.: Facets of the knapsack polytope from minimal covers. SIAM Journal on Applied Mathematics 34(1), 119–148 (1978)
Chor, B., Rivest, R.L.: A knapsack type public key cryptosystem based on arithmetic in finite fields. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 54–65. Springer, Heidelberg (1985)
Desmedt, Y.G.: What happened with knapsack cryptographic schemes? In: Skwirzynski, J.K. (ed.) Performance Limits in Communication Theory and Practice. NATO ASI Series, vol. 142, pp. 113–134. Springer, Netherlands (1988)
Gu, Z., Nemhauser, G.L., Savelsbergh, M.W.P.: Sequence independent lifting in mixed integer programming. J. Comb. Optim. 4(1), 109–129 (2000)
Huang, M., Lee, C., Tzeng, S.: A new knapsack public-key cryptosystem based on permutation combination algorithm (2008), http://isrc.ccs.asia.edu.tw/www/myjournal/P123.pdf
Jain, A., Chaudhari, N.S.: Cryptanalytic results on knapsack cryptosystem using binary particle swarm optimization. In: de la Puerta, J.G., et al. (eds.) International Joint Conference SOCO’14-CISIS’14-ICEUTE’14. AISC, vol. 299, pp. 375–384. Springer, Heidelberg (2014)
Kaparis, K., Letchford, A.N.: Separation algorithms for 0-1 knapsack polytopes. Math. Prog. 124(1-2), 69–91 (2010)
Lagarias, J.C., Odlyzko, A.M.: Solving low-density subset sum problems. J. ACM 32(1), 229–246 (1985)
Lenstra Jr., A.K., Lenstra, H.W., Lováz, L.: Factoring polynomials with rational coefficients. Mathematische Annalen 261(4), 515–534 (1982)
Lenstra Jr, H.W.: Integer programming and cryptography. The Mathematical Intelligencer 6(3), 14–21 (1984)
Liu, A., Wang, J., Han, G., Wang, S., Wen, J.: Improved simulated annealing algorithm solving for 0/1 knapsack problem. In: Proceedings of the 6th ISDA, ISDA 2006, vol. 2, pp. 1159–1164. IEEE Computer Society, DC (2006)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press (2010)
Merkle, R.C., Hellman, M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Transactions on Information Theory 24(5), 525–530 (1978)
Naccache, D., Stern, J.: A new public-key cryptosystem (1997)
Nguyên, P.Q., Stern, J.: Merkle-hellman revisited: A cryptanalysis of the qu-vanstone cryptosystem based on group factorizations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 198–212. Springer, Heidelberg (1997)
Nguyen, P.Q., Vallée, B.: The LLL Algorithm: Survey and Applications, 1st edn. Springer Publishing Company, Incorporated, Heidelberg (2009)
Odlyzko, A.: Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme. IEEE Trans. Inf. Theor. 30, 594–601 (1984)
Qu, M., Vanstone, S.A.: The knapsack problem in cryptography. In: Finite Fields. Contemp Math., vol. 168, pp. 291–308. A.M.S (1994)
Rastaghi, R.: Cryptanalysis of a new knapsack type public-key cryptosystem. CoRR, abs/1210.8375:1–5 (2012)
Ray, A., Bhat, A.: Enhancement of merkle-hellman knapsack cryptosystem by use of discrete logarithmics (2013)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)
Schnorr, C.-P., Hörner, H.H.: Attacking the chor-rivest cryptosystem by improved lattice reduction. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 1–12. Springer, Heidelberg (1995)
Shamir, A.: A polynomial time algorithm for breaking the basic merkle-hellman cryptosystem. In: Advances in Cryptology: Proceedings of CRYPTO 1982, pp. 279–288. Plenum (1982)
Shamir, A.: Embedding cryptographic trapdoors in arbitrary knapsack systems. Information Processing Letters 17(2), 77–79 (1983)
Shamir, A., Zippel, R.: On the security of the Merkle–Hellman cryptographic scheme (corresp.). IEEE Trans. Inf. Theor. 26(3), 339–340 (1980)
Spillman, R.: Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia 17(4), 367–377 (1993)
Van Roy, T.J., Wolsey, L.A.: Solving mixed integer programming problems using automatic reformulation. Operations Research 35(1), 45–57 (1987)
Wang, B., Hu, Y.: Quadratic compact knapsack public-key cryptosystem. Computers & Mathematics with Applications 59(1), 194–206 (2010)
Weismantel, R.: On the 0/1 knapsack polytope. Math. Prog. 77(3), 49–68 (1997)
Wolsey, L.A.: Faces for a linear inequality in 0-1 variables. Math. Prog. 8, 165–178 (1975)
Wolsey, L.A.: Integer programming. Wiley-Interscience, NY (1998)
Zemel, E.: Easily computable facets of the knapsack polytope. Mathematics of Operations Research 14(4), 760–764 (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mak-Hau, V.H., Batten, L.M. (2014). The 0-1 Knapsack Polytope – A Starting Point for Cryptanalysis of Knapsack Ciphers?. In: Batten, L., Li, G., Niu, W., Warren, M. (eds) Applications and Techniques in Information Security. ATIS 2014. Communications in Computer and Information Science, vol 490. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45670-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-45670-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45669-9
Online ISBN: 978-3-662-45670-5
eBook Packages: Computer ScienceComputer Science (R0)