Cryptanalysis of the TRMS Cryptosystem of PKC’05

نویسندگان

  • Luk Bettale
  • Jean-Charles Faugère
  • Ludovic Perret
چکیده

In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) cryptosystem [10] proposed at PKC’05. To do so, we present a hybrid approach for solving the algebraic systems naturally arising when mounting a signature-forgery attack. The basic idea is to compute Gröbner bases of several modified systems rather than a Gröbner basis of the initial system. We have been able to provide a precise bound on the (worst-case) complexity of this approach. For that, we have however assumed a technical condition on the systems arising in our attack; namely the systems are semi-regular [4, 6]. This claim is supported by experimental evidences. Finally, it turns out that our approach is efficient. We have obtained a complexity bounded from above by 2 to forge a signature on the parameters proposed by the designers of TRMS [10]. We also would like to emphasize that our approach is fully parallelizable. For instance, assuming an access to 2 processors (which is very reasonable), one can actually forge a signature in approximatively 32 hours.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of the TRMS Signature Scheme of PKC'05

In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for solving the algebraic systems naturally arising when mounting a signature-forgery attack. The basic idea is to compute Gröbner bases of several modified systems rather than a Gröbner basis of the initial system. We have b...

متن کامل

Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012

This short note describes a key-recovery attack against a multi-variate quadratic cryptosystem proposed by Huang, Liu, and Yang (PKC 2012). Our attack is running lattice-basis reduction algorithms on a lattice constructed from the keys in the cryptosystem. The attack takes less than 20 minutes for the proposed parameter sets which are expected to be 80-bit and 128-bit security.

متن کامل

Hybrid Approach : a Tool for Multivariate Cryptography

In this paper, we present an algorithmic tool to cryptanalysis multivariate cryptosystems. The presented algorithm is a hybrid approach that mixes exhaustive search with classical Gröbner bases computation to solve multivariate polynomial systems over a finite field. Depending on the size of the field, our method is an improvement on existing techniques. For usual parameters of multivariate sch...

متن کامل

Study of McEliece cryptosystem

This report presents a study of the public-key cryptosystem (PKC) proposed by R. J. McEliece in 1978 [25]. The McEliece cryptosystem is based on error-correcting linear codes and is one of the first and so far the most succesful cryptosystem based on notions of coding theory. The original construction in [25] uses binary Goppa codes to encrypt and decrypt messages. Many other variants of the cr...

متن کامل

Leakage Measurement Tool of McEliece PKC Calculator

McEliece Public Key Cryptosystem (PKC) is interesting since its resistance against all known attacks, even using quantum cryptanalysis. Unfortunately, Side Channel Attacks (SCAs) are very powerful attacks which even McEliece PKC is vulnerable to. In this work, we present the Leakage Measurement Tool of the McEliece PKC Calculator [1]. The Calculator also provides test vectors (for all important...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009