期刊文献+

投影HFE^-体制的安全性分析

Cryptanalysis of Projected HFE^- Scheme
下载PDF
导出
摘要 针对投影HFE-体制的安全性,提出了一种代数攻击方法,并指出该体制存在着弱密钥。攻击方法的基本思想是利用投影HFE-体制在扩域上的代数结构,并用私钥仿射部分和私钥结构的缺陷寻找大量的线性方程。研究结果表明,该攻击方法在这种弱密钥情况下可以有效地恢复部分私钥。 For the security of projected HFE- cryptographic scheme,an algebraic method was proposed to attack the scheme and pointed out its weak keys.The basic idea of the attack utilized the underlying algebraic structure of projected HFE- scheme over the extension field,and applyed the affine part of private keys and the weakness caused by the structure of private keys to find a large number of linear equations.The result indicated that the attack can recover the part of private keys efficiently once weak keys are used.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2011年第2期92-97,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(60970119 60803149) 国家"973"计划资助项目(2007CB311201) 西安建筑科技大学青年科技基金资助项目(QN0831)
关键词 密码 公钥密码 多项式 投影HFE-体制 密码分析 cryptography public key cryptography polynomials projected HFE- scheme cryptanalysis
  • 相关文献

参考文献12

  • 1Ding J, Gower J E, Schmidt D S. Multivariate public key cryptosystems [ M ]//Advances in Information Security. USA : Springer, 2006,2/3 : 246 - 247.
  • 2王鑫,张美玲,王新梅.高次MFE多变量加密方案[J].四川大学学报(工程科学版),2009,41(4):171-175. 被引量:6
  • 3Nie X, Hu L, Li J, et al. Breaking a new instance of T'FM cryptosystem [ C ]//Zhou J, Yung M, Bao F. Applied Cryptography and Network Security-ACNS' 2006. Berlin-Heidelberg: Springer-Verlag,2006:210-225.
  • 4Ding J, Hu L, Nie X, et al. High order linearization equation (HOLE) attack on multivariate public key cryptosystems [ C ]//Okamoto T, Wang X. Publie Key Cryptography-PKC ' 2007. Berlin-Heidelberg: Springer-Verlag, 2007 : 233- 248.
  • 5Matsumoto T, hnai H. Public quadratic Polynominal-Tuples for efficient Signature-Verification and Message-Encryption [C]//Guenther C G. Advances in Cryptology-Eurocrypt' 1988. Berlin-Heidelberg : Springer-Verlag, 1988:419 - 453.
  • 6Patarin J. Hidden field equations (HFE) and isomorphism of polynomials (IP) : two new families of asymmetric algorithms [ C ]//Maurer U. Advances in Cryptology-Eurocrypt' 1996. Berlin-Heidelberg : Springer-Verlag, 1996 : 33 -48.
  • 7Patarin J, Goubin L, Courtois N. C ^* + and HM : variations around two schemes of T. Matsumoto and H. Imai [ C ]// Ohta K, Pei D. Advances in Cryptology-Asiacrypt' 1998. Berhn-Heidelberg: Springer-Verlag,1998:35-49.
  • 8Patarin J, Courtois N, Goubin L. FLASH, a fast multivariate signature algorithm [ C ]//Naccache D. Topics in Cryptology-CT-RSA' 2001. Berlin-Heidelberg: Springer-Verlag, 2001:297 - 307.
  • 9Dubois V, Fouque P A, Stern J. Cryptanalysis of SFLASH with slightly modified parameters [ C ]//Naor M. Advances in Cryptology-Eurocrypt' 2007. Berlin-Heidelberg: Springer-Verlag,2007 : 264 - 275.
  • 10Dubois V, Fouque P A, Shamir A, et al. Practical crypta nalysis of SFLASH [ C ]//Menezes A. Advances in Cryptology-Crypto ' 2007. Berlin-Heidelberg: Springer-Verlag, 2007: 1 - 12.

二级参考文献2

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部