Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem

被引:5
|
作者
Chen, Jaihui [1 ]
Tan, Chik How [2 ]
Li, Xiaoyu [3 ]
机构
[1] Guangdong Univ Technol, Sch Comp, Guangzhou 510006, Guangdong, Peoples R China
[2] Natl Univ Singapore, Temasek Labs, Singapore 117411, Singapore
[3] Zhengzhou Univ Aeronaut, Sch Comp, Zhengzhou 450046, Henan, Peoples R China
关键词
cryptanalysis; post-quantum cryptography; multivariate public key cryptosystems; morphism of polynomials problem; ALGORITHMS; SECURITY; SCHEMES; SYSTEMS; SIGN; UOV;
D O I
10.26599/TST.2018.9010028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multivariate Public Key Cryptography (MPKC) has intensively and rapidly developed during the past three decades. MPKC is a promising candidate for post-quantum cryptography. However, designing it is universally regarded as a difficult task to design a secure MPKC foundation scheme, such as an encryption scheme and key exchange scheme. In this work, we investigate the security of a new public key cryptosystem that is based on the Morphism of Polynomials (MP). The public key cryptosystem proposed by Wang et al. (Wuhan University, China) comprises a key exchange scheme and encryption scheme. Its security can be provably reduced to the hardness of solving a new difficult problem, namely, the Decisional Multivariate Diffie Hellman (DMDH) problem. This problem is a variant of the MP problem, which is difficult to solve by random systems. We present a proposition that reduces the DMDH problem to an easy example of the MP problem. Then, we propose an efficient algorithm for the Key Recover Attack (KRA) on the schemes of the public key cryptosystem. In practice, we are able to entirely break the cryptosystem's claimed parameter of 96 security levels in less than 17.252 s. Furthermore, we show that finding parameters that yield a secure and practical scheme is impossible.
引用
收藏
页码:671 / 679
页数:9
相关论文
共 50 条
  • [1] Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem
    Jaihui Chen
    Chik How Tan
    Xiaoyu Li
    [J]. Tsinghua Science and Technology, 2018, 23 (06) : 671 - 679
  • [2] New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
    Houzhen Wang
    Huanguo Zhang
    Shaowu Mao
    Wanqing Wu
    Liqiang Zhang
    [J]. Tsinghua Science and Technology, 2016, 21 (03) : 302 - 311
  • [3] New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
    Wang, Houzhen
    Zhang, Huanguo
    Mao, Shaowu
    Wu, Wanqing
    Zhang, Liqiang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (03) : 302 - 311
  • [4] Cryptanalysis of a Public Key Cryptosystem Based on the Matrix Combinatorial Problem
    Lee, Moon Sung
    [J]. INFORMATICA, 2013, 24 (02) : 219 - 230
  • [5] Cryptanalysis of the public key cryptosystem based on the word problem on the Grigorchuk groups
    Petrides, G
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 234 - 244
  • [6] Cryptanalysis of a public key cryptosystem based on boolean permutations
    Elsheh, Esam
    Youssef, Amr
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2011, 14 (02): : 107 - 115
  • [7] Cryptanalysis of a Knapsack Public Key Cryptosystem
    Wang, Baocang
    Liu, Hui
    Hu, Yupu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 49 - +
  • [8] A public key cryptosystem based on sparse polynomials
    Grant, D
    Krastev, K
    Lieman, D
    Shparlinski, I
    [J]. CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, 2000, : 114 - 121
  • [9] Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes
    Bardet, Magali
    Chaulet, Julia
    Dragoi, Vlad
    Otmani, Ayoub
    Tillich, Jean-Pierre
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 118 - 143
  • [10] Cryptanalysis on a finite automaton public key cryptosystem
    戴大为
    吴逵
    张焕国
    [J]. Science China Technological Sciences, 1996, (01) : 27 - 36