Cryptanalysis of the TRMS Signature Scheme of PKC'05
نویسندگان
چکیده
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for solving the algebraic systems naturally arising when mounting a signature-forgery attack. The basic idea is to compute Gröbner bases of several modified systems rather than a Gröbner basis of the initial system. We have been able to provide a precise bound on the (worst-case) complexity of this approach. For that, we have however assumed a technical condition on the systems arising in our attack; namely the systems are semi-regular [3, 5]. This claim is supported by experimental evidences. Finally, it turns out that our approach is efficient. We have obtained a complexity bounded from above by 2 to forge a signature on the parameters proposed by the designers of TRMS [9]. This bound can be improved; assuming an access to 2 processors (which is very reasonable), one can actually forge a signature in approximately 51 hours.
منابع مشابه
Cryptanalysis of the TRMS Cryptosystem of PKC’05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) cryptosystem [10] proposed at PKC’05. To do so, we present a hybrid approach for solving the algebraic systems naturally arising when mounting a signature-forgery attack. The basic idea is to compute Gröbner bases of several modified systems rather than a Gröbner basis of the initial system. We have been...
متن کاملHybrid Approach : a Tool for Multivariate Cryptography
In this paper, we present an algorithmic tool to cryptanalysis multivariate cryptosystems. The presented algorithm is a hybrid approach that mixes exhaustive search with classical Gröbner bases computation to solve multivariate polynomial systems over a finite field. Depending on the size of the field, our method is an improvement on existing techniques. For usual parameters of multivariate sch...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملCryptanalysis to a Certificateless Threshold Signature Scheme
Certificateless public key cryptography is a new paradigm with two interesting features. On one hand, it keeps the certificate free property of identity-based public key cryptography (ID-PKC), while on the other hand, it gets rid of the inherent key escrow problem of ID-PKC. These two distinctive features make certificateless threshold signature schemes more applicable in practice as it removes...
متن کاملStudy of McEliece cryptosystem
This report presents a study of the public-key cryptosystem (PKC) proposed by R. J. McEliece in 1978 [25]. The McEliece cryptosystem is based on error-correcting linear codes and is one of the first and so far the most succesful cryptosystem based on notions of coding theory. The original construction in [25] uses binary Goppa codes to encrypt and decrypt messages. Many other variants of the cr...
متن کامل