A structural attack to the DME-(3,2,q) cryptosystem

نویسندگان

چکیده

We present a structural attack on the DME cryptosystem with parameters ( 3 , 2 q ) . The recovers 10 of 12 coefficients first linear map. also show that, if those were known, rest private key can be efficiently obtained by solving systems quadratic equations just two variables.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a structural survey of the polish posters

تصویرسازی قابلیتهای فراوانی را دارا است

15 صفحه اول

A practical attack to Bouftass's cryptosystem

In public key cryptography, the security of traditional methods is based on number theoretic problems, and suffers from high computational cost due to problems such as dealing with large numbers. Each user in a public key system has a pair of cryptographic keys, consisting a public key and a private key. These are related through a hard mathematical inversion problem, so that the private key ca...

متن کامل

Attack on RSA Cryptosystem

The RSA cryptosystem is most widely used cryptosystem it may be used to provide both secrecy and digital signatures and its security is based on the intractability of the integer factorization. The security of RSA algorithm depends on the ability of the hacker to factorize numbers. New, faster and better methods for factoring numbers are constantly being devised. The Trent best for long numbers...

متن کامل

An Attack on a Trace-Zero Cryptosystem

It was recently proposed in the literature that the discretelogarithm problem (DLP) in trace-zero groups of genus 2 curves withrespect to constant field extensions of degree 3 is a fast and secure al-ternative to the well established cryptographic primitive of the DLP in elliptic curves over prime fields. We present a novel attack on this primitive. We show that the DLP inthe tr...

متن کامل

A Reaction Attack on the QC-LDPC McEliece Cryptosystem

Guo et al. recently presented a reaction attack against the QC-MDPC McEliece cryptosystem. Their attack is based on the observation that when a bit-flipping decoding algorithm is used in the QC-MDPC McEliece, then there exists a dependence between the secret matrix H and the failure probability of the bit-flipping algorithm. This dependence can be exploited to reveal the matrix H which constitu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Finite Fields and Their Applications

سال: 2021

ISSN: ['1090-2465', '1071-5797']

DOI: https://doi.org/10.1016/j.ffa.2021.101810