Breaking the Symmetry: a Way to Resist the New Differential Attack

نویسندگان

  • Jintai Ding
  • Bo-Yin Yang
  • Chen-Mou Cheng
  • Chia-Hsin Owen Chen
  • Vivien Dubois
چکیده

sflash had recently been broken by Dubois, Stern, Shamir, etc., using a differential attack on the public key. The C∗− signature schemes are hence no longer practical. In this paper, we will study the new attack from the point view of symmetry, then (1) present a simple concept (projection) to modify several multivariate schemes to resist the new attacks; (2) demonstrate with practical examples that this simple method could work well; and (3) show that the same discussion of attack-and-defence applies to other big-field multivariates. The speed of encryption schemes is not affected, and we can still have a big-field multivariate signatures resisting the new differential attacks with speeds comparable to sflash.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

A Computational Study to Find the Vibrational Modes Connected with Specific Molecular Structures of Calculated Compound

The purpose of this research is to provide a deeper understanding of the planar high- symmetry configuration instability. In the ideal case, the distortion corresponds to the movements of nuclei along normal modes that belong to non-totally symmetric irreps of the high symmertry (HS) point group of molecule. The analysis of the structural distortion from the HS nuclear arrangements of the JT ac...

متن کامل

Relaxed Differential Fault Analysis of SHA-3

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

متن کامل

Symmetry and symmetry breaking in cancer: a foundational approach to the cancer problem

Symmetry and symmetry breaking concepts from physics and biology are applied to the problem of cancer. Three categories of symmetry breaking in cancer are examined: combinatorial, geometric, and functional. Within these categories, symmetry breaking is examined for relevant cancer features, including epithelial-mesenchymal transition (EMT); tumor heterogeneity; tensegrity; fractal geometric and...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2007  شماره 

صفحات  -

تاریخ انتشار 2007