The Security of Hidden Field Equations (HFE)
نویسنده
چکیده
We consider the basic version of the asymmetric cryptosystem HFE from Eurocrypt 96. We propose a notion of non-trivial equations as a tentative to account for a large class of attacks on one-way functions. We found equations that give experimental evidence that basic HFE can be broken in expected polynomial time for any constant degree d. It has been independently proven by Shamir and Kipnis [Crypto’99]. We designed and implemented a series of new advanced attacks that are much more efficient that the Shamir-Kipnis attack. They are practical for HFE degree d ≤ 24 and realistic up to d = 128. The 80-bit, 500$ Patarin’s 1st challenge on HFE can be broken in about 2. Our attack is subexponential and requires n 3 2 log d computations. The original Shamir-Kipnis attack was in at least n 2 . We show how to improve the Shamir-Kipnis attack, by using a better method of solving the involved algebraical problem MinRank. It becomes then in n log d+O(1). All attacks fail for modified versions of HFE: HFE− (Asiacrypt’98), HFEv (Eurocrypt’99), Quartz (RSA’2000) and even for Flash (RSA’2000).
منابع مشابه
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
In this paper, we review and explain the existing algebraic cryptanalysis of multivariate cryptosystems from the hidden field equation (HFE) family. These cryptanalysis break cryptosystems in the HFE family by solving multivariate systems of equations. In this paper we present a new and efficient attack of this cryptosystem based on fast algorithms for computing Gröbner basis. In particular it ...
متن کاملOdd-Char Multivariate Hidden Field Equations
We present a multivariate version of Hidden Field Equations (HFE) over a nite eld of odd characteristic, with an extra embedding modi er. Combining these known ideas makes our new MPKC (multivariate public key cryptosystem) more e cient and scalable than any other extant multivariate encryption scheme. Switching to odd characteristics in HFE-like schemes a ects how an attacker can make use of e...
متن کاملAnalysis of Intermediate Field Systems
We study a new generic trapdoor for public key multivariate cryptosystems, called IFS for Intermediate Field Systems, which can be seen as dual to HFE. This new trapdoor relies on the possibility to invert a system of quadratic multivariate equations with few (logarithmic with respect to the security parameter) unknowns on an intermediate field thanks to Gröbner bases algorithms. We provide a c...
متن کاملHidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
In [6] T. Matsumoto and H. Imai described a new asymmetric algorithm based on multivariate polynomials of degree two over a finite field, which was subsequently broken in 191. Here we present two new families of Asymmetric Algnrithrrrs t,liat so far have resisted all attacks, if properly used: Hidden Field Equations (HFE) and Isomorphism of Polynomials (IP). These algorithms can be seen as two ...
متن کاملA family of weak keys in HFE and the corresponding practical key-recovery
The HFE (Hidden Field Equations) cryptosystem is one of the most interesting public-key multivariate scheme. It has been proposed more than 10 years ago by Patarin and seems to withstand the attacks that break many other multivariate schemes, since only subexponential ones have been proposed. The public key is a system of quadratic equations in many variables. These equations are generated from...
متن کامل