Cryptanalysis of the TTM Cryptosystem

نویسندگان

  • Louis Goubin
  • Nicolas Courtois
چکیده

In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building triangular systems we call T has been initiated by Shamir. In the present paper, we study a more general family of TPM (for ”Triangle Plus Minus”) schemes: a triangular construction mixed with some u random polynomials and with some r of the beginning equations removed. We go beyond all previous attacks proposed on such cryptosystems using a low degree component of the inverse function. The cryptanalysis of TPM is reduced to a simple linear algebra problem called MinRank(r): Find a linear combination of given matrices that has a small rank r. We introduce a new attack for MinRank called ‘Kernel Attack’ that works for q small. We explain that TPM schemes can be used in encryption only if q is small and therefore they are not secure. As an application, we showed that the TTM cryptosystem proposed by T.T. Moh at CrypTec’99 [15, 16] reduces to MinRank(2). Thus, though the cleartext size is 512 bits, we break it in O(2). The particular TTM of [15, 16] can be broken in O(2) due additional weaknesses, and we needed only few minutes to solve the challenge TTM 2.1. from the web site of the TTM selling company, US Data Security. We also studied TPM in signature, possible only if q small. It is equally insecure: the ‘Degeneracy Attack’ we introduce runs in q·polynomial.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Two New Instances of TTM Cryptosystem

In 2006, Nie et al proposed an attack to break an instance of TTM cryptosystems. However, the inventor of TTM disputed this attack and he proposed two new instances of TTM to support his viewpoint. At this time, he did not give the detail of key construction — the construction of the lock polynomials in these instances which would be used in decryption. The two instances are claimed to achieve ...

متن کامل

Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem

A Tamed Transformation Method (TTM) cryptosystem was proposed by T.T.Moh in 1999. We describe how the rst implementation scheme of the TTM system can be defeated. The computational complexity of our attack is 2 33 computations on the nite eld with 2 8 elements. 1. Introduction During the last twenty years, public key cryptosystems have been developed to become an important part of our modern co...

متن کامل

On the Goubin-Courtois Attack on TTM

In the paper [1] published in “Asiacrypt 2000”, L. Goubin and N.T. Courtois propose an attack on the TTM cryptosystem. In paper [1], they mispresent TTM cryptosystem. Then they jump an attack from an example of TTM to the general TTM cryptosystem. Finally they conclude:”There is very little hope that a secure triangular system (Tame transformation system in our terminology) will ever be propose...

متن کامل

On Tame Transformation Method (ttm)

A fast encryption system (TTM) will be discussed in this article. TTM is an encryp-tion system based on multivariate tame automorphisms over some small eld. It is related to an open and diicult problem in mathematics. The TTM system is 100 or more faster than RSA 1024 and the corresponding ECC. In 11] and 12], the mathematical part of the system is provided. However, the presentation there is q...

متن کامل

CAES Cryptosystem: Advanced Security Tests and Results

A robust and secure cryptosystem is an encrypting system that resists against all practical cryptanalysis methods such as statistical attacks, differential cryptanalysis and linear cryptanalysis. To prove the resistance against these attacks, the cryptosystem designer must carry out a list of robustness tests. Considering these constraints, we present in the current paper results of robustness ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000