DocumentCode :
2649533
Title :
Breaking Instance II of New TTM Cryptosystems
Author :
Nie, Xuyun ; Jiang, Xin ; Hu, Lei ; Ding, Jintai ; Qin, Zhiguang
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu
fYear :
2008
fDate :
15-17 Aug. 2008
Firstpage :
1332
Lastpage :
1335
Abstract :
TTM (tame transformation method) is a type of multivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attacks, in particular, the Nie et al attack. The two instances are claimed to achieve a security of 2109 against Nie et al attack. Through computation, we found that the instance II satisfied First Order Linearization Equations. After finding all linearization equations, we can perform a ciphertext-only attack to break it.
Keywords :
linearisation techniques; public key cryptography; TTM cryptosystems; ciphertext-only attack; first order linearization equations; multivariate public key cryptosystem; tame transformation method; Computer science; Equations; Geometry; Polynomials; Public key; Public key cryptography; Quantum computing; Resists; Signal processing; Time to market; attack; cryptosystem;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3278-3
Type :
conf
DOI :
10.1109/IIH-MSP.2008.246
Filename :
4604288
Link To Document :
بازگشت