... : Variations around two schemes of T. Matsumoto and H. Imai
نویسندگان
چکیده
In 4], H. Imai and T. Matsumoto presented some new candidate trapdoor one-way permutations with a public key given as multivariate polynomials over a nite eld. One of these schemes was later presented in 7] under the name C , and was based on the idea of hiding a monomial eld equation. This scheme was broken in 8] by Jacques Patarin, due to unexpected algebraic properties.) some schemes to repair C , but this was done at the cost of slightly more complex public key or secret key computations. In part I of this paper, we will study some very simple variations of the C scheme, where the attack of 8] is avoided, and where the very simple secret key computations are kept. The C ?+ scheme will be one of these variations. We will design some new cryptanalysis that are eecient against some of { but not all { these variations. Another scheme of 4], very diierent from C (despite the name), was called C] and was based on the idea of hiding a monomial matrix equation. No cryptanalysis has been published so far for this scheme. In part II of this paper, we will show how to attack this scheme C]. We will then study more general schemes, still using the idea of hiding matrix equations. The HM scheme will be one of these variations.
منابع مشابه
C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
In [4], H. Imai and T. Matsumoto presented some new candidate trapdoor one-way permutations with a public key given as multivariate polynomials over a finite field. One of these schemes was later presented in [7] under the name C∗, and was based on the idea of hiding a monomial field equation. This scheme was broken in [8] by Jacques Patarin, due to unexpected algebraic properties. J. Patarin a...
متن کاملHidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new Families of Asymmetric Algorithms
In [11] T. Matsumoto and H. Imai described a new asymmetric algorithm based on multivariate polynomials of degree two over a nite eld. Then in [14] this algorithm was broken. The aim of this paper is to show that despite this result it is probably possible to use multivariate polynomials of degree two in carefully designed algorithms for asymmetric cryptography. In this paper we will give some ...
متن کاملHidden Field Equations (hfe) and Isomorphisms of Polynomials (ip): Two New Families of Asymmetric Algorithms -extended Version
In 11] T. Matsumoto and H. Imai described a new asymmetric algorithm based on multivariate polynomials of degree two over a nite eld. Then in 14] this algorithm was broken. The aim of this paper is to show that despite this result it is probably possible to use multivariate polynomials of degree two in carefully designed algorithms for asymmetric cryptography. In this paper we will give some ex...
متن کاملFast Cryptanalysis of the Matsumoto-Imai Public Key Scheme
The Matsumoto-Imai public key scheme was developed to provide very fast signatures. It is based on substitution polynomials over GF( 2 ). This paper shows in two ways that the Matsumoto-Imai public key scheme is very easy to break. In the faster of the two attacks the time to cryptanalyze the scheme is about proportional to the binary length of the public key. This shows that Matsumoto and Imai...
متن کاملEquivalent keys in ℳultivariate uadratic public key systems
Multivariate Quadratic public key schemes have been suggested back in 1985 by Matsumoto and Imai as an alternative for the RSA scheme. Since then, several other schemes have been proposed, for example Hidden Field Equations, Unbalanced Oil and Vinegar schemes, and Stepwise Triangular Schemes. All these schemes have a rather large key space for a secure choice of parameters. Surprisingly, the qu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007