期刊文献+

TTM密码系统的扰动变形 被引量:3

Perturbed Variant of TTM Cryptosystem
下载PDF
导出
摘要 把内部扰动加到TTM密码系统之上,构建了该密码系统的新变形·然后针对该变形给定小参数的实例,考察了它们在极小秩攻击和线性化函数方程攻击下的安全性·给出了该变形不存在线性化函数方程的必要条件;计算机模拟实验表明,该TTM密码系统变形几乎不存在线性化函数方程·最后给出了一个实例,并且评估了其实现性能以及安全性· Internal perturbation is added to the TTM cryptosystem, and its new variant is constructed. Using small instances of the variant, the security of the new variant is investigated against minrank attack and linearization equation attack. The necessary condition is given, under which there do not exist linear equations in the variant of the TTM cryptosystem. Computer experiments indicate that there almost do not exist linear equations in the new variant. A specific instance is proposed for practical implementation, and its performance and security are estimated.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第12期2082-2087,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60473026)~~
关键词 公钥 多变量 扰动 线性化函数方程 public key multivariate perturbation linearization function equation
  • 相关文献

参考文献14

  • 1T Moh.A public key sytem with signature and master key functions[J].Communications in Algebra,1999,27:2207,2222
  • 2Louis Goubin,Nicolas T Courtois.Cryptanalysis of the TTM cryptosystem[G].In:Proc of Asiacrypt'2000,LNCS 1976.Berlin:Springer-Verlag,2000.44-57
  • 3T Moh,J M Chen.On the Goubin-Courtois attack on TTM[OL].Http://eprint.iacr.org/2001/072/,2005
  • 4Jintai Ding,D Schmidt.A defect of the implementation schemes of the TTM cryptosystem[OL].Http://eprint.iacr.org/2003/084/,2005
  • 5T Moh,J M Chen,B Y Yang.Building instances of TTM immune to the Goubin-Courtois attack and the Ding-Schmidt attack[OL].Http://eprint.iacr.org/2004/168,2005
  • 6Jintai Ding.A new variant of the Matsumoto-Imai cryptosystem through perturbation[G].In:Proc of PKC'2004,LNCS 2947.Berlin:Springer-Verlag,2004.305-318
  • 7Jintai Ding.Cryptanalysis of HFEV and internal perturbation of HFE[G].In:Proc of PKC'2005,LNCS 3386.Berlin:Springer-Verlag,2005.288-301
  • 8Zhiping Wu,Jintai Ding,Dingfeng Ye.Perturbed hidden matrix cryptosystems[G].In:Proc of ICCSA'2005,LNCS 3481.Berlin:Springer-Verlag,2005.595-602
  • 9Nicolas T Courtois.The security of hidden field equations(HFE)[G].In:Proc of CT-RSA'2001,LNCS 2020.Springer-Verlag,2001.266-281
  • 10Jacques Patarin.Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypto'96[J].Designs,Codes and Cryptography,2000,20(2):175-209

同被引文献35

  • 1Shor P W. Polynomial-Time Algorithms for Prime Faetorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Journal on Computing, 1997,26(5) : 1484-1509.
  • 2Garay M R, Johson D S. Computers and Intractability: A Guide to the Theory of NP2 Completeness [M]. New York : W H Freeman and Company,1979.
  • 3Goubin L, Patarin J. Trapdoor One-Way Permutations and Multivariate Polynomials [C]//Proc of ICICS&apos' 97, 1997: 356-368.
  • 4Partarin J. Hidden Field Equations(HFE) and Isomorphismof Polynomial(IP):Two New Families of Asym-metric Algorithms[C]//Proc of Eurocrpyt' 96, 1996: 33-48.
  • 5Fell H, Diffie W. Analysis of a Public Key Approach Based on Polynomial Substitution [C]//Proc of Crypto' 85, 1985 340-349.
  • 6Courtois N, Goubin L,Patafin J. SFlash: Primitive Specification and Supporting Documentation[EB/OL]. [2002-05-07]. https://www. cosic. esat. kuleuven. be/nessie.
  • 7Ding J, Schraidt D. Rainbow, A New Multivafiable Polynomial Signature Scheme[C] //Proc of Applied Cryptography and Network Sccurity,2005:164-175.
  • 8Wang Lih-Chung, Yang Bo-yin, Hu Yuh-hua,et al. A Medium-Field Multivariate Public key Eneryption Scheme[C]// Proc of Topics in Cryptology,2006:132-149.
  • 9Ding Jintai, Hu Lei, Nie Xuyun, et al. High Oder Linearization Equation Attack on Multivariate Public Key Cryptosystems[EB/OL]. [2008-05-12]. http://eprint. iacr. org/ 2006/336. pdf.
  • 10SHOR P. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5): 1484-1509.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部