期刊文献+

Weakness in Projected C*- Scheme 被引量:1

Weakness in Projected C*- Scheme
下载PDF
导出
摘要 This paper presents an algebraic method to attack the projected C*? cryptographic scheme.The attack applies the affine parts of the private keys and the weakness caused by the structures of the private keys to find a large number of linear equations.The attack can recover the private keys efficiently when the parameters are small enough.Meanwhile,the weak keys of the scheme are found and the private keys can be recovered efficiently once the weak keys are used.The paper also proposes a new modification of C*? cryptographic scheme,which is not only as efficient as original projected C*? scheme,but also resistant to the differential attack and the attack proposed in this paper. This paper presents an algebraic method to attack the projected C* cryptographic scheme. The attack applies the affine parts of the private keys and the weakness caused by the structures of the private keys to find a large number of linear equations. The attack can recover the private keys efficiently when the parameters are small enough. Meanwhile, the weak keys of the scheme are found and the private keys can be recovered efficiently once the weak keys are used. The paper also proposes a new modification of C* cryptographic scheme, which is not only as efficient as original projected C*- scheme, but also resistant to the differential attack and the attack proposed in this paper.
出处 《China Communications》 SCIE CSCD 2010年第4期29-34,共6页 中国通信(英文版)
基金 This work is supported by the National Natural Science Foundation of China under Grants No.60970119 and No.60803149, the Youth Science and Technology Foundation of Xi'an University of Architecture and Technology (QN0831), and the National Basic Research Program (973 Program) of China under Grants No.2007CB311201.
关键词 Information Security Public Key Cryptography ATTACK WEAKNESS 通信技术 安全技术 代数 计算机技术
  • 相关文献

参考文献7

  • 1Ding J, Gower J E, Schmidt D S. Multivariate public key cryptosystems [M]. New York: Springer, 2006: 2-3,246-247.
  • 2Patarin J, Courtois N, Goubin L. FLASH, a fast multivariate signature algorithmiC]//Topics in Cryptology-CT-RSA'2001, LNCS 2020, Berlin Heidelberg: Springer-Verlag, 2001: 297-307.
  • 3Dubois V, Fouque P A, Shamir A, et al.. Practical cryptanalysis of SFLASH[C]//Advances in Cryptology-CRYPTO'2007, LNCS 4622, Berlin Heidelberg: Sorineer-Verlag. 2007: 1-12.
  • 4Ding J, Dubois V, Yang B, et al.. Could SFLASH be repaired?[C]// 35th International Colloquium on Automata, Languages and Programming-ICALP'2008, Part II, LNCS 5126, Berlin Heidelberg: Springer-Verlag, 2008:691-701.
  • 5Kipnis A, Shamir A. Cryptanalysis of the HFE public key cryptosystem by relinearization[C]//Advances in Cryptology- CRYPTO 1999, LNCS 1666, Berlin Heidelberg: Springer-Verlag, 1999: 19-30.
  • 6Wolf C, Preneel B. Equivalent keys in HFE, C', and variations[C]// Progress in Cryptology-Mycrypt'2005, LNCS 3725, Berlin Heidelberg: Springer-Verlag, 2005: 33-49.
  • 7Courtois N, Klimov A, Patarin J, et al.. Efficient algorithms for solving overdefined systems of multivariate polynomial equations[C]// Advances in Cryptology-EUROCRYPT'2000, LNCS 1807, Berlin Heidelberg: Springer-Verlag, 2000: 392-407.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部