The Merkle–Hellman knapsack cryptosystem was one of the earliest
public key
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
cryptosystems
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption).
Typically, a cryptosystem consists of three algorithms: one for key generation, one for ...
. It was published by
Ralph Merkle
Ralph C. Merkle (born February 2, 1952) is a computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics.
Contribution ...
and
Martin Hellman
Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his involvement with public key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to ...
in 1978. A polynomial time attack was published by
Adi Shamir
Adi Shamir ( he, עדי שמיר; born July 6, 1952) is an Israeli cryptographer. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identifica ...
in 1984. As a result, the cryptosystem is now considered insecure.
History
The concept of
public key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
was introduced by
Whitfield Diffie
Bailey Whitfield 'Whit' Diffie (born June 5, 1944), ForMemRS, is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper ''New Dire ...
and Martin Hellman in 1976.
At that time they proposed the general concept of a "trap-door one-way function", a function whose inverse is computationally infeasible to calculate without some secret "trap-door information"; but they had not yet found a practical example of such a function. Several specific public-key cryptosystems were then proposed by other researchers over the next few years, such as
RSA
RSA may refer to:
Organizations Academia and education
* Rabbinical Seminary of America, a yeshiva in New York City
*Regional Science Association International (formerly the Regional Science Association), a US-based learned society
*Renaissance S ...
in 1977 and Merkle-Hellman in 1978.
Description
Merkle–Hellman is a public key cryptosystem, meaning that two keys are used, a public key for encryption and a private key for decryption. It is based on the
subset sum problem The subset sum problem (SSP) is a decision problem in computer science. In its most general formulation, there is a multiset S of integers and a target-sum T, and the question is to decide whether any subset of the integers sum to precisely T''.'' ...
(a special case of the
knapsack problem
The knapsack problem is a problem in combinatorial optimization: Given a set of items, each with a weight and a value, determine the number of each item to include in a collection so that the total weight is less than or equal to a given limit a ...
). The problem is as follows: given a set of integers
and an integer
, find a subset of
which sums to
. In general, this problem is known to be
NP-complete
In computational complexity theory, a problem is NP-complete when:
# it is a problem for which the correctness of each solution can be verified quickly (namely, in polynomial time) and a brute-force search algorithm can find a solution by tryin ...
. However, if
is
superincreasing, meaning that each element of the set is greater than the sum of all the numbers in the set lesser than it, the problem is "easy" and solvable in polynomial time with a simple
greedy algorithm
A greedy algorithm is any algorithm that follows the problem-solving heuristic of making the locally optimal choice at each stage. In many problems, a greedy strategy does not produce an optimal solution, but a greedy heuristic can yield locall ...
.
In Merkle–Hellman, decrypting a message requires solving an apparently "hard" knapsack problem. The private key contains a superincreasing list of numbers
, and the public key contains a non-superincreasing list of numbers
, which is actually a "disguised" version of
. The private key also contains some "trapdoor" information that can be used to transform a hard knapsack problem using
into an easy knapsack problem using
.
Unlike some other public key cryptosystems such as
RSA
RSA may refer to:
Organizations Academia and education
* Rabbinical Seminary of America, a yeshiva in New York City
*Regional Science Association International (formerly the Regional Science Association), a US-based learned society
*Renaissance S ...
, the two keys in Merkle-Hellman are not interchangeable; the private key cannot be used for encryption. Thus Merkle-Hellman is not directly usable for authentication by
cryptographic signing, although Shamir published a variant that can be used for signing.
Key generation
1. Choose a block size
. Integers up to
bits in length can be encrypted with this key.
2. Choose a random superincreasing sequence of
positive integers
In mathematics, the natural numbers are those numbers used for counting (as in "there are ''six'' coins on the table") and ordering (as in "this is the ''third'' largest city in the country").
Numbers used for counting are called ''Cardinal n ...
:
:The superincreasing requirement means that
, for
.
3. Choose a random integer
such that
:
4. Choose a random integer
such that
(that is,
and
are
coprime
In mathematics, two integers and are coprime, relatively prime or mutually prime if the only positive integer that is a divisor of both of them is 1. Consequently, any prime number that divides does not divide , and vice versa. This is equival ...
).
5. Calculate the sequence
:
:where
.
The public key is
and the private key is
.
Encryption
Let
be an
-bit message consisting of bits
, with
the highest order bit. Select each
for which
is nonzero, and add them together. Equivalently, calculate
:
.
The ciphertext is
.
Decryption
To decrypt a ciphertext
, we must find the subset of
which sums to
. We do this by transforming the problem into one of finding a subset of
. That problem can be solved in polynomial time since
is superincreasing.
1. Calculate the
modular inverse of
modulo
using the
Extended Euclidean algorithm
In arithmetic and computer programming, the extended Euclidean algorithm is an extension to the Euclidean algorithm, and computes, in addition to the greatest common divisor (gcd) of integers ''a'' and ''b'', also the coefficients of Bézout's ...
. The inverse will exist since
is coprime to
.
:
:The computation of
is independent of the message, and can be done just once when the private key is generated.
2. Calculate
:
3. Solve the subset sum problem for
using the superincreasing sequence
, by the simple greedy algorithm described below. Let
be the resulting list of indexes of the elements of
which sum to
. (That is,
.)
4. Construct the message
with a 1 in each
bit position and a 0 in all other bit positions:
:
Solving the subset sum problem
This simple greedy algorithm finds the subset of a superincreasing sequence
which sums to
, in polynomial time:
:1. Initialize
to an empty list.
:2. Find the largest element in
which is less than or equal to
, say
.
:3. Subtract:
.
:4. Append
to the list
.
:5. If
is greater than zero, return to step 2.
Example
Key generation
Create a key to encrypt 8-bit numbers by creating a random superincreasing sequence of 8 values:
:
The sum of these is 706, so select a larger value for
:
:
.
Choose
to be coprime to
:
:
.
Construct the public key
by multiplying each element in
by
modulo
:
:
Hence
.
Encryption
Let the 8-bit message be
. We multiply each bit by the corresponding number in
and add the results:
0 * 295
+ 1 * 592
+ 1 * 301
+ 0 * 14
+ 0 * 28
+ 0 * 353
+ 0 * 120
+ 1 * 236
= 1129
The ciphertext
is 1129.
Decryption
To decrypt 1129, first use the Extended Euclidean Algorithm to find the modular inverse of
mod
:
:
.
Compute
.
Use the greedy algorithm to decompose 372 into a sum of
values:
:
Thus
, and the list of indexes is
. The message can now be computed as
:
.
Cryptanalysis
In 1984 Adi Shamir published an attack on the Merkle-Hellman cryptosystem which can decrypt encrypted messages in polynomial time without using the private key.
The attack analyzes the public key
and searches for a pair of numbers
and
such that
is a superincreasing sequence. The
pair found by the attack may not be equal to
in the private key, but like that pair it can be used to transform a hard knapsack problem using
into an easy problem using a superincreasing sequence. The attack operates solely on the public key; no access to encrypted messages is necessary.
References
{{DEFAULTSORT:Merkle-Hellman Knapsack Cryptosystem
Public-key encryption schemes
Broken cryptography algorithms