Practical algebraic cryptanalysis for dragon-based cryptosystems

2Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were proposed as efficient and secure schemes. In particular, the inventors of the two schemes claim that Little Dragon Two and Poly-Dragon resist algebraic cryptanalysis. In this paper, we show that MXL2, an algebraic attack method based on the XL algorithm and Ding's concept of Mutants, is able to break Little Dragon Two with keys of length up to 229 bits and Poly-Dragon with keys of length up to 299. This contradicts the security claim for the proposed schemes and demonstrates the strength of MXL2 and the Mutant concept. This strength is further supported by experiments that show that in attacks on both schemes the MXL2 algorithm outperforms the Magma's implementation of F4. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Buchmann, J., Bulygin, S., Ding, J., Mohamed, W. S. A. E., & Werner, F. (2010). Practical algebraic cryptanalysis for dragon-based cryptosystems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6467 LNCS, pp. 140–155). https://doi.org/10.1007/978-3-642-17619-7_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free