Cryptanalysis of the TRMC-4 public key cryptosystem

1Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In 2006, the inventors of TRMC public key cryptosystem proposed a new variant of TRMC, TRMC-4, which can resist the existing attack, in particular, the Joux et al attack. In this paper, we show that the new version is vulnerable to attack via the linearization equations (LE) method. For any given valid ciphertext and its corresponding TRMC-4 public key, we can derive the corresponding plaintext within 224 double-struck F sign 28-operations, after performing once for the public key a computation of complexity less than 234. Our results are confirmed by computer experiments. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Nie, X., Hu, L., Ding, J., Li, J., & Wagner, J. (2007). Cryptanalysis of the TRMC-4 public key cryptosystem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4521 LNCS, pp. 104–115). Springer Verlag. https://doi.org/10.1007/978-3-540-72738-5_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free