Published: August 27, 2012
Author(s)
Daniel Smith-Tone
Conference
Name: Third Workshop on Mathematical Cryptology (WMC 2012)
Dates: July 9-11, 2012
Location: Castro Urdiales, Spain
Citation: Extended abstracts of the Third Workshop on Mathematical Cryptology (WMC 2012) and the Third International Conference on Symbolic Computation and Cryptography (SCC 2012), pp. 71-78
Announcement
Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have been formed by attempting to hide the hidden structure of equations have been broken by observing symmetric properties of the differential of the public key, the dichotomy between the roles of the different types of variables, or even the different types of monomials in the systems, have given rise to differential invariant attacks which distinguish between subspaces corresponding to one type of variable or the other. In this monologue, we take a general approach, and describe a basic construction, TriTon, of which several of the above types of systems are special cases. We analyse this system, and conclude that such constructions are weak with naive choices of parameters.
Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have been formed by attempting to hide the hidden...
See full abstract
Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have been formed by attempting to hide the hidden structure of equations have been broken by observing symmetric properties of the differential of the public key, the dichotomy between the roles of the different types of variables, or even the different types of monomials in the systems, have given rise to differential invariant attacks which distinguish between subspaces corresponding to one type of variable or the other. In this monologue, we take a general approach, and describe a basic construction, TriTon, of which several of the above types of systems are special cases. We analyse this system, and conclude that such constructions are weak with naive choices of parameters.
Hide full abstract
Keywords
differential invariant; multivariate public key cryptography
Control Families
None selected