A structural attack to the DME-(3,2,q) cryptosystem
نویسندگان
چکیده
We present a structural attack on the DME cryptosystem with parameters ( 3 , 2 q ) . The recovers 10 of 12 coefficients first linear map. also show that, if those were known, rest private key can be efficiently obtained by solving systems quadratic equations just two variables.
منابع مشابه
A practical attack to Bouftass's cryptosystem
In public key cryptography, the security of traditional methods is based on number theoretic problems, and suffers from high computational cost due to problems such as dealing with large numbers. Each user in a public key system has a pair of cryptographic keys, consisting a public key and a private key. These are related through a hard mathematical inversion problem, so that the private key ca...
متن کاملAttack on RSA Cryptosystem
The RSA cryptosystem is most widely used cryptosystem it may be used to provide both secrecy and digital signatures and its security is based on the intractability of the integer factorization. The security of RSA algorithm depends on the ability of the hacker to factorize numbers. New, faster and better methods for factoring numbers are constantly being devised. The Trent best for long numbers...
متن کاملAn Attack on a Trace-Zero Cryptosystem
It was recently proposed in the literature that the discretelogarithm problem (DLP) in trace-zero groups of genus 2 curves withrespect to constant field extensions of degree 3 is a fast and secure al-ternative to the well established cryptographic primitive of the DLP in elliptic curves over prime fields. We present a novel attack on this primitive. We show that the DLP inthe tr...
متن کاملA Reaction Attack on the QC-LDPC McEliece Cryptosystem
Guo et al. recently presented a reaction attack against the QC-MDPC McEliece cryptosystem. Their attack is based on the observation that when a bit-flipping decoding algorithm is used in the QC-MDPC McEliece, then there exists a dependence between the secret matrix H and the failure probability of the bit-flipping algorithm. This dependence can be exploited to reveal the matrix H which constitu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Finite Fields and Their Applications
سال: 2021
ISSN: ['1090-2465', '1071-5797']
DOI: https://doi.org/10.1016/j.ffa.2021.101810