Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure

被引:0
|
作者
Cao, Weiwei [1 ]
Hu, Lei [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
关键词
Multivariate public key encryption; internal perturbation; quadratic polynomial; differential attack; ALGORITHMS; MATSUMOTO;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, Wang et al proposed a new middle-field type scheme for multivariate public key encryption. There are three equations in the central map, so it is convenient to name it TH. They found that some linearization equations can be derived for TH and to overcome this defect, they combined the internal perturbation and plus methods to obtain an improved scheme which we call PTH+. They claimed that PTH+ can resist all known types of attacks, including differential attack, and to ensure it achieves a security level higher than 2(80), they suggested the parameter is taken as (l, r, m) = (47, 6, 11). In this paper, we show that TH has a much weaker structure than what is analyzed by the inventors and it can be totally cracked by linearization attack. For PTH+, we propose a method to reduce the attack against PTH+ to an attack on TH+ (a plus variant of TH) using the property on its differentials, which was originally regarded as impossible by that authors. The total complexity of our attack is 2(l+r+1)(2l)(w) approximate to 2(72), which is independent on the number m of the additional random quadratic equations by the plus method and disproves the claim in their original paper that the larger is the m, the securer is PTH+.
引用
收藏
页码:254 / 267
页数:14
相关论文
共 50 条
  • [31] Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption
    Xiao, Dianyan
    Yu, Yang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [32] Cryptanalysis of chaos-based ElGamal public-key encryption
    Hane, Ryuichi
    Kohda, Tohru
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2007, 17 (10): : 3619 - 3623
  • [33] Cryptanalysis of multiple chaotic systems based public key encryption technique
    Wang Kai
    Pei Wen-Jiang
    Zou Liu-Hua
    He Zhen-Ya
    ACTA PHYSICA SINICA, 2006, 55 (12) : 6243 - 6247
  • [34] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    WuhanUniversityJournalofNaturalSciences, 2012, 17 (03) : 223 - 228
  • [35] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [36] Evolution of the McEliece Public Key Encryption Scheme
    Bucerzan, Dominic
    Dragoi, Vlad
    Kalachi, Herve Tale
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 129 - 149
  • [37] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [38] An efficient RSA public key encryption scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad A.
    Al-Fayoumi, Mustafa
    Jabbar, Haidar S.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 127 - +
  • [39] A Public Key Encryption Scheme for String Identification
    Ray, Indranil Ghosh
    Rajarajan, Muttukrishnan
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 104 - 111