2005
DOI: 10.1007/978-3-540-30580-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of the Tractable Rational Map Cryptosystem

Abstract: In this paper, we present the cryptanalysis of a public key scheme based on a system of multivariate polynomial equations, the "tractable rational map" cryptosystem. We show combinatorial weaknesses of the cryptosystem, and introduce a variant of the XL resolution algorithm, the Linear Method, which is able to leverage these weaknesses to invert in short time the trapdoor one-way function defined by the cipher using only the public key, and even rebuild a private key. We also interpret the behavior of the Line… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…When F is public, then recovering the secret-key precisely means solving an instance of the IP problem. Several cryptosystems have been built on this idea [182], [183], [184], but they have all been broken [185], [186], [187], [188], [185], [189], [190], [191]. The main reason behind this fiasco is that the specific instances of the IP problem exposed by these schemes were weak because F was too special, so that polynomial-time and/or efficient algorithms to crack them have eventually been designed [192], [193].…”
Section: Pkcs Based On Multivariate Quadratic Equationsmentioning
confidence: 99%
“…When F is public, then recovering the secret-key precisely means solving an instance of the IP problem. Several cryptosystems have been built on this idea [182], [183], [184], but they have all been broken [185], [186], [187], [188], [185], [189], [190], [191]. The main reason behind this fiasco is that the specific instances of the IP problem exposed by these schemes were weak because F was too special, so that polynomial-time and/or efficient algorithms to crack them have eventually been designed [192], [193].…”
Section: Pkcs Based On Multivariate Quadratic Equationsmentioning
confidence: 99%
“…We can see a good example of what can go wrong in [15] if we try to construct an encryption scheme, where the initial vinegar variables is determined through an initial block of equations. Example 1. enTTS (20,28) of [25] has structure (8, 9, 1, 1, 9) and this central map: 27 .…”
Section: Rainbow-like Multivariate Signaturesmentioning
confidence: 99%
“…The empirical approach in this case would be much faster than the theoretic in providing an insight on the cryptographic strength of a primitive. Furthermore, a theoretical approach continuously challenges the soundness of the formulations and the definitions of cryptographic tasks (see for example [14]), whereas the empirical approach is mainly concerned in offering practical security. It is therefore apparent from the above that a synergetic approach between theoretical and empirical analysis could contribute to a more effective research, as one analysis facilitates the other: the theoretical formulates and provides the necessary sound foundations for empirical research, whereas empirical analysis strengthens intuitiveness.…”
Section: Introductionmentioning
confidence: 99%