2005
DOI: 10.1007/11426639_20
|View full text |Cite
|
Sign up to set email alerts
|

Differential Cryptanalysis for Multivariate Schemes

Abstract: Abstract. In this paper we propose a novel cryptanalytic method against multivariate schemes, which adapts differential cryptanalysis to this setting. In multivariate quadratic systems, the differential of the public key is a linear map and has invariants such as the dimension of the kernel. Using linear algebra, the study of this invariant can be used to gain information on the secret key. We successfully apply this new method to break the original Matsumoto-Imai cryptosystem using properties of the different… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0

Year Published

2005
2005
2008
2008

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 76 publications
(66 citation statements)
references
References 15 publications
0
66
0
Order By: Relevance
“…Q(f ) plays a role in masking the original public key E and randomizing it. r is appended to the polynomial sets in order to cope with the differential attack [9,6]. Note that t random variables x p+1 , .…”
Section: Mpkcs In Generalmentioning
confidence: 99%
See 2 more Smart Citations
“…Q(f ) plays a role in masking the original public key E and randomizing it. r is appended to the polynomial sets in order to cope with the differential attack [9,6]. Note that t random variables x p+1 , .…”
Section: Mpkcs In Generalmentioning
confidence: 99%
“…In 2005 Fouque, Granboulan, and Stern [9] adapted the differential cryptanalysis to MPKCs in order to break MI and its variant, called PMI [3]. In the differential attack, the attacker tries…”
Section: Differential Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The differential of the public key of a multivariate scheme has been introduced in a systematic cryptanalytic method by Fouque et al in [9]. Later, this method has been developed and extended in [6,7,5,4] to attack various systems.…”
Section: Differential and Properties For Monomialsmentioning
confidence: 99%
“…A simpler internal variation had been previously proposed based on the Matsumoto-Imai cryptosystem [2] and had already been asserted to provide immunity against algebraic attacks [3]. Unfortunately, the Matsumoto-Imai cryptosystem has a very specific structure and the internal perturbation could actually be removed using the recently introduced differential technique [8]. In this work, we consider the enhanced internal perturbation variation as applied to HFE and defined in [4].…”
Section: Introductionmentioning
confidence: 99%