Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition

被引:5
|
作者
Liu Jinhui [1 ,2 ]
Zhang Huanguo [1 ,2 ]
Jia Jianwei [1 ,2 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Hubei, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Post-quantum computational cryptography; Cryptanalysis; Polynomial symmetrical decomposition (PSD) problem; Computational complexity; ALGORITHM; GROBNER;
D O I
10.1049/cje.2017.05.005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and ElGamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found that are able to solve certain mathematical problems on non-commutative algebraic structures. Against this background, some novel public key cryptography based on Polynomial symmetrical decomposition (PSD) problem have been proposed. We find that these schemes are not secure. We present that they are vulnerable to structural attack, linearization equations attack, overdefined systems of multivariate polynomial equations attack and that, they only require polynomial time complexity to retrieve the same secret key for some given public keys respectively. We also propose an improvement to enhance public key cryptography based on PSD problem. In addition, we discuss possible lines of future work.
引用
收藏
页码:1139 / 1146
页数:8
相关论文
共 50 条
  • [11] Cryptanalysis of two identification schemes based on an ID-based cryptosystem
    Tang, Q
    Mitchell, CJ
    IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (05): : 723 - 724
  • [12] Cryptanalysis of a simple key assignment for access control based on polynomial
    Lee, Cheng-Chi
    Lai, Yan-Ming
    Hsiao, Chin-Sung
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (04) : 215 - 218
  • [13] Cryptanalysis and improvement of signcryption schemes
    Petersen, H
    Michels, M
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
  • [14] Cryptanalysis of Two Identification Schemes
    Tan, Syh-Yuan
    Chin, Ji-Jian
    Behnia, Rouzbeh
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 33 - 36
  • [15] Cryptanalysis of Blind Signature Schemes
    Singh, Nitu
    Das, Sumanjit
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (05): : 73 - 77
  • [16] (Quantum) Cryptanalysis of Misty Schemes
    Gouget, Aline
    Patarin, Jacques
    Toulemonde, Ambre
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 43 - 57
  • [17] Improved cryptanalysis of rank metric schemes based on Gabidulin codes
    Ayoub Otmani
    Hervé Talé Kalachi
    Sélestin Ndjeya
    Designs, Codes and Cryptography, 2018, 86 : 1983 - 1996
  • [18] Cryptanalysis of matrix conjugation schemes
    Myasnikov, Alex D.
    Ushakov, Alexander
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2014, 8 (02) : 95 - 114
  • [19] Cryptanalysis of ElGamal type encryption schemes based on conic curves
    Dai, ZD
    Ye, DF
    Pei, DY
    Yang, JH
    ELECTRONICS LETTERS, 2001, 37 (07) : 426 - 426
  • [20] Improved cryptanalysis of rank metric schemes based on Gabidulin codes
    Otmani, Ayoub
    Kalachi, Herve Tale
    Ndjeya, Selestin
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (09) : 1983 - 1996