Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
On the security of stepwise triangular systems
Wolf C., Braeken A., Preneel B. Designs, Codes and Cryptography40 (3):285-302,2006.Type:Article
Date Reviewed: Apr 11 2007

Let F be a finite field of q elements and P′ be a system of quadratic polynomials p1, ... , pm in n variables over F. Let SGLn(F) and TGLm(F) be linear transformations over F and P=S ˆ P′ ˆ T, where ˆ denotes the composition of functions considered here componentwise. The system P′ is called the private key and P the public key in the multivariate public key cryptoscheme.

In this note, the authors analyze that variant of multivariate PKC where P′ forms a stepwise triangular system, STS. This means that n=r1 + ... + rL and m=m1 + ... + mL with positive integers r1, ... , rL, m1, ... , mL such that p{m1+ ... + ml-1+i, 1 ≤ iml contain only the variables xk with k ≤ &Sgr;lj=1 rj. The analysis is worked out in the special case when r1= ... =rL = m1= ... = mL=r.

There are two efficient cryptoanalytic attacks presented that break the STS-based multivariate PKC. The inversion attack recovers the message for given ciphertext in O(mn3Lqr+n2Lrqr) operations, while the structural attack computes an equivalent form of the secret key from the public key in O(mn3Lqr+mn4) steps. Both attacks are based on the observation that, for STSs, the kernels of the linear transformations associated with the matrices of the homogenous quadratic parts of the polynomials pi form a descending chain of subspaces. The proposed attacks are efficient from a theoretical point of view because the legitimate user needs O(qr) time to decrypt the message. It works well in practice too, as shown through the solution of two challenges of Kasahara and Sakai [1].

Reviewer:  A. Pethö Review #: CR134132 (0802-0175)
1) Kasahara, M.; Sakai, R. A construction of public key cryptosystem for realizing ciphertext of size 100 bit and digital signature scheme. IEICE Trans. Fundamentals E87, (2004), 102–109.
Bookmark and Share
 
Public Key Cryptosystems (E.3 ... )
 
 
Code Breaking (E.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy