A family of weak keys in HFE and the corresponding practical key-recovery

被引:4
|
作者
Bouillaguet, Charles [1 ]
Fouque, Pierre-Alain [1 ]
Joux, Antoine [2 ]
Treger, Joana [2 ,3 ]
机构
[1] Ecole Normale Super, F-75005 Paris, France
[2] Univ Versailles, St Quentin En Yveline, France
[3] Agence Natl Secur Syst Informat, St Quentin En Yveline, France
关键词
Cryptanalysis; multivariate cryptography; HFE; weak keys; Grobner bases;
D O I
10.1515/JMC.2011.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The HFE (hidden field equations) cryptosystem is one of the most interesting public-key multivariate schemes. It has been proposed more than 10 years ago by Patarin and seems to withstand the attacks that break many other multivariate schemes, since only subexponential ones have been proposed. The public key is a system of quadratic equations in many variables. These equations are generated from the composition of the secret elements: two linear mappings and a polynomial of small degree over an extension field. In this paper we show that there exist weak keys in HFE when the coefficients of the internal polynomial are defined in the ground field. In this case, we reduce the secret key recovery problem to an instance of the Isomorphism of Polynomials (IP) Problem between the equations of the public key and themselves. Even though the hardness of recovering the secret-key of schemes such as SFLASH or C* relies on the hardness of the IP Problem, this is normally not the case for HFE, since the internal polynomial is kept secret. However, when a weak key is used, we show how to recover all the components of the secret key in practical time, given a solution to an instance of the IP Problem. This breaks in particular a variant of HFE proposed by Patarin to reduce the size of the public key and called the "subfield variant". Recovering the secret key takes a few minutes.
引用
收藏
页码:247 / 275
页数:29
相关论文
共 50 条
  • [31] Key-Recovery Security of Single-Key Even-Mansour Ciphers
    Isobe, Takanori
    Shibutani, Kyoji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (07) : 893 - 905
  • [32] Key-Recovery Attacks on LED-Like Block Ciphers
    Linhong Xu
    Jiansheng Guo
    Jingyi Cui
    Mingming Li
    TsinghuaScienceandTechnology, 2019, 24 (05) : 585 - 595
  • [33] Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
    Tapiador, Juan E.
    Orfila, Agustin
    Ribagorda, Arturo
    Ramos, Benjamin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) : 312 - 325
  • [34] Key-recovery attacks on universal hash function based MAC algorithms
    Handschuh, Helena
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 144 - +
  • [35] A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
    Guo Q.
    Johansson A.
    Johansson T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 800 - 827
  • [36] A Key-Recovery Attack Against Mitaka in the t-Probing Model
    Prest, Thomas
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 205 - 220
  • [37] Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV
    Ferreira, River Moreira
    Perret, Ludovic
    PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 222 - 235
  • [38] Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes
    Gilbert, Henri
    Plut, Jerome
    Treger, Joana
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 475 - 490
  • [39] Weak keys in the McEliece public-key cryptosystem
    Loidreau, P
    Sendrier, N
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (03) : 1207 - 1211
  • [40] Weak Keys for AEZ, and the External Key Padding Attack
    Mennink, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 223 - 237