Solving polynomial systems with noise over F2: Revisited

نویسندگان

  • ZhenYu Huang
  • Dongdai Lin
چکیده

Solving polynomial systems with noise over F2 is a fundamental problem in computer science, especially in cryptanalysis. ISBS is a new method for solving this problem based on the idea of incrementally solving the noisy polynomial systems and backtracking all the possible noises. It had better performance than other methods in solving the Cold Boot Key recovery problem. In this paper, some further researches on ISBS are presented. We proposed a polynomial ordering scheme by which we can accelerate the incremental solving process of ISBS. We present some computation complexity bounds of ISBS. Two major improvement strategies, artificial noise-bound strategy and two-direction searching strategy, are proposed and theoretically analyzed. Based on these improvements, we propose a variant ISBS algorithm, and by the experiments of solving the Cold Boot key recovery problem of Serpent with symmetric noise, we show that our new algorithm is more efficient than the old one.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algebraic attacks using SAT-solvers

Algebraic attacks lead to the task of solving polynomial systems over F2. We study recent suggestions of using SAT-solvers for this task. In particular, we develop several strategies for converting the polynomial system to a set of CNF clauses. This generalizes the approach in [4]. Moreover, we provide a novel way of transforming a system over F2e to a (larger) system over F2. Finally, the effi...

متن کامل

Secure PRNGs from Specialized Polynomial Maps over Any Fq

Berbain, Gilbert, and Patarin presented QUAD, a pseudo random number generator (PRNG) at Eurocrypt 2006. QUAD (as PRNG and stream cipher) may be proved secure based on an interesting hardness assumption about the one-wayness of multivariate quadratic polynomial systems over F2. The original BGP proof only worked for F2 and left a gap to general Fq. We show that the result can be generalized to ...

متن کامل

A Characteristic Set Method for Equation Solving in F2 and Applications in Cryptanalysis of Stream Ciphers

In this paper, we present a characteristic set method to solve polynomial equation systems in the finite field F2. Due to the special property of F2, the given characteristic set methods are much more efficient and simpler than the general characteristic set method. We also use our methods to solve equations raised from cryptanalysis of stream ciphers based on nonlinear filter generators.

متن کامل

Fast Exhaustive Search for Polynomial Systems in F2

We analyze how fast we can solve general systems of multivariate equations of various low degrees over F2; this is a well known hard problem which is important both in itself and as part of many types of algebraic cryptanalysis. Compared to the standard exhaustive search technique, our improved approach is more efficient both asymptotically and practically. We implemented several optimized vers...

متن کامل

Quantum Algorithms for Optimization and Polynomial Systems Solving over Finite Fields

In this paper, we give quantum algorithms for two fundamental computation problems: solving polynomial systems and optimization over finite fields. The quantum algorithms can solve these problems with any given probability and have complexities polynomial in the size of the input and the condition number of certain polynomial system related to the problem. So, we achieved exponential speedup fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014