Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem

نویسندگان

  • Xuyun Nie
  • Chuanyong Hou
  • Zhaohu Xu
  • Gang Lu
چکیده

Medium Field Equations (MFE), which is a type of multivariate public key encryptions scheme proposed by Wang et al., was broken by Ding et al. using high order linearization equation (HOLE) attack. Recently, many people attempt to modify the second order matrices structure in the central map of MFE to resist HOLE attack. In this paper, we gave deeply analysis of all possible constructions by products of the second order matrices and their variants with transpose and adjoint in the central map of MFE. We proved that any modification with transpose and adjoint would satisfy the First Order Linearization Equations or the Second Order Linearization Equations. As an example, we gave a practical cryptanalysis of an improved MFE scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cubic Medium Field Equation Public Key Cryptosystem

Medium Field Equation (MFE) multivariate public key cryptosystems were broken by High Order Linearization Equation (HOLE) attack. In order to avoid HOLE attack, we proposed an improvement of MFE, Cubic MFE public key encryption scheme. In our construction, multiplications of three second order matrices were used to get a set of cubic polynomials in the central map. Through theoretical analysis ...

متن کامل

High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems

In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosystem, is proposed by Wang, Yang, Hu and Lai. We use the second order linearization equation attack method by Patarin to break MFE. Given a ciphertext, we can derive the plaintext within 2 F216 -multiplications, after performing o...

متن کامل

A More Secure MFE Multivariate Public Key Encryption Scheme

In 2007 PKC conference, Ding, et al use the second order linearization equation attack method to break what be called MFE multivariate public key encryption scheme, and also proposed a high order linearization equation attack on multivariate public key cryptosystems. To resist high order linearization equation attack, we present an enhanced MFE encryption scheme in this article. The improved sc...

متن کامل

Analysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection

We analysed and solved possible singularity for an improved MFE multivariate public key (Medium Field Multivariate Public Key Encryption) and studied the use of it in software copy protection. We used our new MFE multivariate public key cryptosystem to design an algorithm of software registration, in which a given plaintext can result in multi-cipher-text.. The breaking is hard because the ciph...

متن کامل

Multivariate public key cryptosystems from diophantine equations

At CT-RSA 2006, Wang et al. [WYHL06] introduced the MFE cryptosystem, which was subsequently broken by Ding et al. [DHNW07]. Inspired by their work, we present a more general framework for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We also propose a new public key cryptosystem, based on Diophantine equations, which implements the fr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016