A family of weak keys in HFE and the corresponding practical key-recovery

被引:4
|
作者
Bouillaguet, Charles [1 ]
Fouque, Pierre-Alain [1 ]
Joux, Antoine [2 ]
Treger, Joana [2 ,3 ]
机构
[1] Ecole Normale Super, F-75005 Paris, France
[2] Univ Versailles, St Quentin En Yveline, France
[3] Agence Natl Secur Syst Informat, St Quentin En Yveline, France
关键词
Cryptanalysis; multivariate cryptography; HFE; weak keys; Grobner bases;
D O I
10.1515/JMC.2011.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The HFE (hidden field equations) cryptosystem is one of the most interesting public-key multivariate schemes. It has been proposed more than 10 years ago by Patarin and seems to withstand the attacks that break many other multivariate schemes, since only subexponential ones have been proposed. The public key is a system of quadratic equations in many variables. These equations are generated from the composition of the secret elements: two linear mappings and a polynomial of small degree over an extension field. In this paper we show that there exist weak keys in HFE when the coefficients of the internal polynomial are defined in the ground field. In this case, we reduce the secret key recovery problem to an instance of the Isomorphism of Polynomials (IP) Problem between the equations of the public key and themselves. Even though the hardness of recovering the secret-key of schemes such as SFLASH or C* relies on the hardness of the IP Problem, this is normally not the case for HFE, since the internal polynomial is kept secret. However, when a weak key is used, we show how to recover all the components of the secret key in practical time, given a solution to an instance of the IP Problem. This breaks in particular a variant of HFE proposed by Patarin to reduce the size of the public key and called the "subfield variant". Recovering the secret key takes a few minutes.
引用
收藏
页码:247 / 275
页数:29
相关论文
共 50 条
  • [21] A Key-Recovery Attack on Authentication Watermarking by Li and Yuan
    Schaathun, Hans Georg
    MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 221 - 225
  • [22] A Key-Recovery Attack on 855-round Trivium
    Fu, Ximing
    Wang, Xiaoyun
    Dong, Xiaoyang
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 160 - 184
  • [23] Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
    Wang, Tianrui
    Wang, Anyu
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 70 - 100
  • [24] Key-Recovery Attacks on LED-Like Block Ciphers
    Xu, Linhong
    Guo, Jiansheng
    Cui, Jingyi
    Li, Mingming
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 585 - 595
  • [25] New Key-Recovery Attack on Reduced-Round AES
    Bardeh, Navid Ghaedi
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 43 - 62
  • [26] Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
    Cui, Tingting
    Grassi, Lorenzo
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 171 - 197
  • [27] Key-Recovery Fault Injection Attack on the Classic McEliece KEM
    Pircher, Sabine
    Geier, Johannes
    Danner, Julian
    Mueller-Gritschneder, Daniel
    Wachter-Zeh, Antonia
    CODE-BASED CRYPTOGRAPHY, CBCRYPTO 2022, 2023, 13839 : 37 - 61
  • [28] The security of elastic block ciphers against key-recovery attacks
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 89 - +
  • [29] A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
    Faugere, Jean-Charles
    Gligoroski, Danilo
    Perret, Ludovic
    Samardjiska, Simona
    Thomae, Enrico
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 150 - 174
  • [30] Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
    Jauch, Melanie
    Maram, Varun
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2023, 2024, 14201 : 275 - 296