Cryptanalysis of 2R- schemes

22Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we study the security of 2R- schemes [17,18], which are the "minus variant" of two-round schemes. This variant consists in removing some of the n polynomials of the public key, and permits to thwart an attack described at Crypto'99 [25] against two-round schemes. Usually, the "minus variant" leads to a real strengthening of the considered schemes. We show here that this is actually not true for 2R - schemes. We indeed propose an efficient algorithm for decomposing 2R- schemes. For instance, we can remove up to [n/2] equations and still be able to recover a decomposition in O(n12). We provide experimental results illustrating the efficiency of our approach. In practice, we have been able to decompose 2R- schemes in less than a handful of hours for most of the challenges proposed by the designers [18]. We believe that this result makes the principle of two-round schemes, including 2R- schemes, useless. © International Association for Cryptologic Research 2006.

Cite

CITATION STYLE

APA

Faugère, J. C., & Perret, L. (2006). Cryptanalysis of 2R- schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4117 LNCS, pp. 357–372). Springer Verlag. https://doi.org/10.1007/11818175_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free