Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem

被引:0
|
作者
Bouillaguet, Charles [1 ]
Faugere, Jean-Charles
Fouque, Pierre-Alain [1 ]
Perret, Ludovic
机构
[1] Ecole Normale Super, F-75231 Paris, France
来源
关键词
GROBNER BASES; SQUARE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a practical cryptanalysis of the Identification Scheme proposed by Patarin at Crypto 1996. This scheme relies on the hardness of the Isomorphism of Polynomial with One Secret (IP1S), and enjoys shorter key than many other schemes based on the hardness of a combinatorial problem (as opposed to number-theoretic problems). Patarin proposed concrete parameters that have not been broken faster than exhaustive search so far. On the theoretical side, IP1S has been shown to be harder than Graph Isomorphism, which makes it an interesting target. We present two new deterministic algorithms to attack the IP1S problem, and we rigorously analyze their complexity and success probability. We show that they can solve a (big) constant fraction of all the instances of degree two in polynomial time. We verified that our algorithms are very efficient in practice. All the parameters with degree two proposed by Patarin are now broken in a few seconds. The parameters with degree three can be broken in less than a CPU-month. The identification scheme is thus quite badly broken.
引用
收藏
页码:473 / 493
页数:21
相关论文
共 50 条
  • [1] A fast cryptanalysis of the isomorphism of polynomials with one secret problem
    Perret, L
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 354 - 370
  • [2] Cryptanalysis of an identification scheme based on the permuted perceptron problem
    Knudsen, LR
    Meier, W
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 363 - 374
  • [3] Algorithms based on *-algebras, and their applications to isomorphism of polynomials with one secret, group isomorphism, and polynomial identity testing
    Ivanyos, Gabor
    Qiao, Youming
    SODA'18: PROCEEDINGS OF THE TWENTY-NINTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2018, : 2357 - 2376
  • [4] ALGORITHMS BASED ON *-ALGEBRAS, AND THEIR APPLICATIONS TO ISOMORPHISM OF POLYNOMIALS WITH ONE SECRET, GROUP ISOMORPHISM, AND POLYNOMIAL IDENTITY TESTING
    Ivanyos, Gabor
    Qiao, Youming
    SIAM JOURNAL ON COMPUTING, 2019, 48 (03) : 926 - 963
  • [5] Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
    Coron, JS
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 14 - 27
  • [6] A Secret Sharing Shuffling Scheme Based on Polynomial
    Zhang, Xi
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1746 - 1750
  • [7] Reviving Identification Scheme Based on Isomorphism of Polynomials with Two Secrets: a Refined Theoretical and Practical Analysis
    Santoso, Bagus
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (05): : 787 - 798
  • [8] Secret Image Sharing Scheme Based on Bivariate Polynomial
    Tang, Dan
    Huang, Jian
    2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 193 - 195
  • [9] An identification system based on the explicit isomorphism problem
    Kiss, Sandor Z.
    Kutas, Peter
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2023, 34 (06) : 913 - 930
  • [10] An identification system based on the explicit isomorphism problem
    Sándor Z. Kiss
    Péter Kutas
    Applicable Algebra in Engineering, Communication and Computing, 2023, 34 : 913 - 930