Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC

29Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we study the new class step-wise Triangular Schemes (STS) of public key cryptosystems (PKC) based on multivariate quadratic polynomials. In these schemes, we have m the number of equations, n the number of variables, L the number of steps/layers, r the number of equations/variables per step, and q the size of the underlying field. We present two attacks on the STS class by exploiting the chain of the kernels of the private key polynomials. The first attack is an inversion attack which computes the message/signature for given ciphertext/message in O(mn3Lqr + n2Lrq r), the second is a structural attack which recovers an equivalent version of the secret key in O(mn3Lqr + mn4) operations. Since the legitimate user has workload qr for decrypting/computing a signature, the attacks presented in this paper are very efficient. As an application, we show that two special instances of STS, namely RSE(2)PKC and RSSE(2)PKC, recently proposed by Kasahara and Sakai, are insecure. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Wolf, C., Braeken, A., & Preneel, B. (2005). Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC. In Lecture Notes in Computer Science (Vol. 3352, pp. 294–309). Springer Verlag. https://doi.org/10.1007/978-3-540-30598-9_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free