Title :
Breaking Instance II of New TTM Cryptosystems
Author :
Nie, Xuyun ; Jiang, Xin ; Hu, Lei ; Ding, Jintai ; Qin, Zhiguang
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu
Abstract :
TTM (tame transformation method) is a type of multivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attacks, in particular, the Nie et al attack. The two instances are claimed to achieve a security of 2109 against Nie et al attack. Through computation, we found that the instance II satisfied First Order Linearization Equations. After finding all linearization equations, we can perform a ciphertext-only attack to break it.
Keywords :
linearisation techniques; public key cryptography; TTM cryptosystems; ciphertext-only attack; first order linearization equations; multivariate public key cryptosystem; tame transformation method; Computer science; Equations; Geometry; Polynomials; Public key; Public key cryptography; Quantum computing; Resists; Signal processing; Time to market; attack; cryptosystem;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3278-3
DOI :
10.1109/IIH-MSP.2008.246