A family of weak keys in HFE and the corresponding practical key-recovery

被引:4
|
作者
Bouillaguet, Charles [1 ]
Fouque, Pierre-Alain [1 ]
Joux, Antoine [2 ]
Treger, Joana [2 ,3 ]
机构
[1] Ecole Normale Super, F-75005 Paris, France
[2] Univ Versailles, St Quentin En Yveline, France
[3] Agence Natl Secur Syst Informat, St Quentin En Yveline, France
关键词
Cryptanalysis; multivariate cryptography; HFE; weak keys; Grobner bases;
D O I
10.1515/JMC.2011.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The HFE (hidden field equations) cryptosystem is one of the most interesting public-key multivariate schemes. It has been proposed more than 10 years ago by Patarin and seems to withstand the attacks that break many other multivariate schemes, since only subexponential ones have been proposed. The public key is a system of quadratic equations in many variables. These equations are generated from the composition of the secret elements: two linear mappings and a polynomial of small degree over an extension field. In this paper we show that there exist weak keys in HFE when the coefficients of the internal polynomial are defined in the ground field. In this case, we reduce the secret key recovery problem to an instance of the Isomorphism of Polynomials (IP) Problem between the equations of the public key and themselves. Even though the hardness of recovering the secret-key of schemes such as SFLASH or C* relies on the hardness of the IP Problem, this is normally not the case for HFE, since the internal polynomial is kept secret. However, when a weak key is used, we show how to recover all the components of the secret key in practical time, given a solution to an instance of the IP Problem. This breaks in particular a variant of HFE proposed by Patarin to reduce the size of the public key and called the "subfield variant". Recovering the secret key takes a few minutes.
引用
收藏
页码:247 / 275
页数:29
相关论文
共 50 条
  • [41] Full Round Distinguishing and Key-Recovery Attacks on SAND-2
    Zhang, Zhuolong
    Chen, Shiyao
    Wang, Wei
    Wang, Meiqin
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 230 - 250
  • [42] Key Recovery Attack for All Parameters of HFE-
    Vates, Jeremy
    Smith-Tone, Daniel
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 272 - 288
  • [43] Redefining Security in Shadow Cipher for IoT Nodes: New Full-Round Practical Distinguisher and the Infeasibility of Key-Recovery Attacks
    Kim, Sunyeop
    Shin, Myoungsu
    Kim, Seonkyu
    Shin, Hanbeom
    Kim, Insung
    Kwon, Donggeun
    Lee, Dongjae
    Kim, Seonggyeom
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 6805 - 6817
  • [44] Efficient Key Recovery for All HFE Signature Variants
    Tao, Chengdong
    Petzoldt, Albrecht
    Ding, Jintai
    ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 70 - 93
  • [45] Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT
    Florez-Gutierrez, Antonio
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 221 - 249
  • [46] Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
    Ye, Chen-Dong
    Tian, Tian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (03) : 81 - 102
  • [47] Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
    Chaigneau, Colin
    Gilbert, Henri
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (01) : 114 - 133
  • [48] Improved key-recovery attacks on reduced-round WEM-8
    Jun Liu
    Dachao Wang
    Yupu Hu
    Jie Chen
    Baocang Wang
    Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
  • [49] Practical key recovery schemes
    Yen, SM
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 104 - 114
  • [50] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
    Dong, Xiaoyang
    Hua, Jialiang
    Sun, Siwei
    Li, Zheng
    Wang, Xiaoyun
    Hu, Lei
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308