Cryptanalysis of the TRMS Cryptosystem of PKC’05
نویسندگان
چکیده
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) cryptosystem [10] proposed at PKC’05. To do so, we present a hybrid approach for solving the algebraic systems naturally arising when mounting a signature-forgery attack. The basic idea is to compute Gröbner bases of several modified systems rather than a Gröbner basis of the initial system. We have been able to provide a precise bound on the (worst-case) complexity of this approach. For that, we have however assumed a technical condition on the systems arising in our attack; namely the systems are semi-regular [4, 6]. This claim is supported by experimental evidences. Finally, it turns out that our approach is efficient. We have obtained a complexity bounded from above by 2 to forge a signature on the parameters proposed by the designers of TRMS [10]. We also would like to emphasize that our approach is fully parallelizable. For instance, assuming an access to 2 processors (which is very reasonable), one can actually forge a signature in approximatively 32 hours.
منابع مشابه
Cryptanalysis of the TRMS Signature Scheme of PKC'05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for solving the algebraic systems naturally arising when mounting a signature-forgery attack. The basic idea is to compute Gröbner bases of several modified systems rather than a Gröbner basis of the initial system. We have b...
متن کاملCryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012
This short note describes a key-recovery attack against a multi-variate quadratic cryptosystem proposed by Huang, Liu, and Yang (PKC 2012). Our attack is running lattice-basis reduction algorithms on a lattice constructed from the keys in the cryptosystem. The attack takes less than 20 minutes for the proposed parameter sets which are expected to be 80-bit and 128-bit security.
متن کاملHybrid Approach : a Tool for Multivariate Cryptography
In this paper, we present an algorithmic tool to cryptanalysis multivariate cryptosystems. The presented algorithm is a hybrid approach that mixes exhaustive search with classical Gröbner bases computation to solve multivariate polynomial systems over a finite field. Depending on the size of the field, our method is an improvement on existing techniques. For usual parameters of multivariate sch...
متن کاملStudy of McEliece cryptosystem
This report presents a study of the public-key cryptosystem (PKC) proposed by R. J. McEliece in 1978 [25]. The McEliece cryptosystem is based on error-correcting linear codes and is one of the first and so far the most succesful cryptosystem based on notions of coding theory. The original construction in [25] uses binary Goppa codes to encrypt and decrypt messages. Many other variants of the cr...
متن کاملLeakage Measurement Tool of McEliece PKC Calculator
McEliece Public Key Cryptosystem (PKC) is interesting since its resistance against all known attacks, even using quantum cryptanalysis. Unfortunately, Side Channel Attacks (SCAs) are very powerful attacks which even McEliece PKC is vulnerable to. In this work, we present the Leakage Measurement Tool of the McEliece PKC Calculator [1]. The Calculator also provides test vectors (for all important...
متن کامل