Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
نویسندگان
چکیده
The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarin’s linearization attack, the core idea of MI has been used to construct many variants such as Sflash, which has recently been accepted for use in the New European Schemes for Signatures, Integrity, and Encryption project. Linearization attacks take advantage of the algebraic structure of MI to produce a set of equations that can be used to recover the plaintext from a given ciphertext. In our paper, we present a solution to the problem of finding the dimension of the space of linearization equations, a measure of how much work the attack will require.
منابع مشابه
Construction of Extended Multivariate Public Key Cryptosystems
Based on the ideas: “invertible cycle”, “tame transformation” and “special oil and vinegar”, three different nonlinear invertible transformations were constructed separately. Then making use of the idea of the extended multivariate public key cryptosystem, and combining the nonlinear invertible transformations above with Matsumoto-Imai (MI) scheme, three methods of designing extended multivaria...
متن کاملInoculating Multivariate Schemes Against Differential Attacks
We demonstrate how to prevent differential attacks on multivariate public key cryptosystems using the Plus (+) method of external perturbation. In particular, we prescribe adding as few as 10 Plus polynomials to the Perturbed Matsumoto-Imai (PMI) cryptosystem when g = 1 and r = 6, where θ is the Matsumoto-Imai exponent, n is the message length, g = gcd (θ, n), and r is the internal perturbation...
متن کاملCryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem
A Tamed Transformation Method (TTM) cryptosystem was proposed by T.T.Moh in 1999. We describe how the rst implementation scheme of the TTM system can be defeated. The computational complexity of our attack is 2 33 computations on the nite eld with 2 8 elements. 1. Introduction During the last twenty years, public key cryptosystems have been developed to become an important part of our modern co...
متن کاملCryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem
Imai and Matsumoto introduced alternative algebraic methods for constructing public key cryptosystems. An obvious advantage of theses public key cryptosystems is that the private side computations can be made very efficient with a simple hardware. Almost all of these proposals and variants of them were broken. However, scheme “B” in [3] is still unbroken. In this paper we show some statistical ...
متن کاملCryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle
In 2016, Qiao et al. proposed a novel extended multivariate public key cryptosystem (EMC) to enhance the security of multivariate public key cryptosystem. They applied it on Matsumoto-Imai (MI) encryption scheme and claimed that the enhanced MI scheme can be secure against Linearization Equation (LE) attack. Through analysis, we found that the enhanced MI scheme satisfied Quadratization Equatio...
متن کامل