Cryptanalysis of RGB, a mixed multivariate signature scheme

被引:2
|
作者
Shim, Kyung-Ah [1 ]
Park, Cheol-Min [1 ]
Koo, Namhun [1 ]
机构
[1] Natl Inst Math Sci, Div Fus & Convergence Math Sci, 628 Daeduk Boulevard, Daejeon, South Korea
关键词
Equivalent key; Good key; Key recovery attack; Multivariate quadratic problem; UOV; OIL;
D O I
10.1016/j.ffa.2016.11.013
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Public-Key Cryptography (PKC) based on multivariate quadratic equations is one of the most promising alternatives for classical PKC after the eventual coming of quantum computers. Recently, Shen and Tang proposed a new MQ-signature scheme, RGB, based on three types of variables, Red(r), Green(g) and Blue(b). They claimed that signing for RGB is faster than that of UOV and Rainbow. At ACISP 2016, Tang et al. implemented RGB on S5PV210 and MT6582 microprocessors at 64, 80, 96, 118 and 128-bit security levels for practical use. Their results are much more efficient than other MQ-signature schemes, so RGB is very appealing for resource-limited devices. We show that ROB with their suggested parameters at 64, 80, 96, 118 and 128 security levels are entirely broken by key recovery attacks using good keys. From a practical point of view, we are able to break their parameters at 64, 80, 96, 118 and 128 security levels in less than 0.48 seconds, 1.7 seconds, 90.68 seconds, 11 minutes and 6.82 hours, respectively. Consequently, we show that signing and the key sizes for RGB with secure parameter sets are much slower and larger than those of UOV and Rainbow. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:406 / 421
页数:16
相关论文
共 50 条
  • [1] RGB, a Mixed Multivariate Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    COMPUTER JOURNAL, 2016, 59 (04): : 439 - 451
  • [2] Cryptanalysis of the multivariate signature scheme proposed in pqcrypto 2013
    Hashimoto, Yasufumi
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 108 - 125
  • [3] Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013
    Hashimoto, Yasufumi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01): : 58 - 65
  • [4] Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013
    Hashimoto, Yasufumi
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 108 - 125
  • [5] Cryptanalysis of the SHMW signature scheme
    Lau, Terry Shue Chien
    Ariffin, Muhammad Rezal Kamel
    Yip, Sook-Chin
    Chin, Ji-Jian
    Ting, Choo-Yee
    HELIYON, 2024, 10 (02)
  • [6] Cryptanalysis of the SNOVA Signature Scheme
    Li, Peigen
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 79 - 91
  • [7] Cryptanalysis of the SFLASH signature scheme
    Dubois, Vivien
    Fouque, Pierre-Alain
    Shamir, Adi
    Stern, Jacques
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 1 - 4
  • [8] Cryptanalysis of Quantum Blind Signature Scheme
    Zuo, Huijuan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (01) : 322 - 329
  • [9] Cryptanalysis and improvement of a group signature scheme
    College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
    Tien Tzu Hsueh Pao, 2007, 4 (778-781):
  • [10] Cryptanalysis of the revised NTRU signature scheme
    Gentry, C
    Szydlo, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 299 - 320