A family of weak keys in HFE and the corresponding practical key-recovery

被引:4
|
作者
Bouillaguet, Charles [1 ]
Fouque, Pierre-Alain [1 ]
Joux, Antoine [2 ]
Treger, Joana [2 ,3 ]
机构
[1] Ecole Normale Super, F-75005 Paris, France
[2] Univ Versailles, St Quentin En Yveline, France
[3] Agence Natl Secur Syst Informat, St Quentin En Yveline, France
关键词
Cryptanalysis; multivariate cryptography; HFE; weak keys; Grobner bases;
D O I
10.1515/JMC.2011.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The HFE (hidden field equations) cryptosystem is one of the most interesting public-key multivariate schemes. It has been proposed more than 10 years ago by Patarin and seems to withstand the attacks that break many other multivariate schemes, since only subexponential ones have been proposed. The public key is a system of quadratic equations in many variables. These equations are generated from the composition of the secret elements: two linear mappings and a polynomial of small degree over an extension field. In this paper we show that there exist weak keys in HFE when the coefficients of the internal polynomial are defined in the ground field. In this case, we reduce the secret key recovery problem to an instance of the Isomorphism of Polynomials (IP) Problem between the equations of the public key and themselves. Even though the hardness of recovering the secret-key of schemes such as SFLASH or C* relies on the hardness of the IP Problem, this is normally not the case for HFE, since the internal polynomial is kept secret. However, when a weak key is used, we show how to recover all the components of the secret key in practical time, given a solution to an instance of the IP Problem. This breaks in particular a variant of HFE proposed by Patarin to reduce the size of the public key and called the "subfield variant". Recovering the secret key takes a few minutes.
引用
收藏
页码:247 / 275
页数:29
相关论文
共 50 条
  • [1] Weak-keys and key-recovery attack for TinyJAMBU
    Dutta, Pranjal
    Rajasree, Mahesh Sreekumar
    Sarkar, Santanu
    SCIENTIFIC REPORTS, 2022, 12 (01):
  • [2] Practical Key-Recovery Attack on MANTIS(5)
    Dobraunig, Christoph
    Eichlseder, Maria
    Kales, Daniel
    Mendel, Florian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 248 - 260
  • [3] Practical Key-Recovery for All Possible Parameters of SFLASH
    Bouillaguet, Charles
    Fouque, Pierre-Alain
    Macario-Rat, Gilles
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 667 - +
  • [4] Practical Key-Recovery Attack on MQ-Sign and More
    Aulbach, Thomas
    Samardjiska, Simona
    Trimoska, Monika
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 168 - 185
  • [5] A Practical Key-Recovery Attack on 805-Round Trivium
    Ye, Chen-Dong
    Tian, Tian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 187 - 213
  • [6] Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ
    Dhiman Saha
    Sourya Kakarla
    Srinath Mandava
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2017, 1 (3) : 282 - 296
  • [7] Key-Recovery Attacks on ASASA
    Brice Minaud
    Patrick Derbez
    Pierre-Alain Fouque
    Pierre Karpman
    Journal of Cryptology, 2018, 31 : 845 - 884
  • [8] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 3 - 27
  • [9] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    JOURNAL OF CRYPTOLOGY, 2018, 31 (03) : 845 - 884
  • [10] Key-Recovery Attacks on CRAFT and WARP
    Sun, Ling
    Wang, Wei
    Wang, Meiqin
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 77 - 95