Cryptanalysis Of The Hidden Matrix Cryptosystem

LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America(2010)

引用 6|浏览0
暂无评分
摘要
In this paper, we present an efficient cryptanalysis of the so-called HM cryptosystem which was published at Asiacrypt'1999, and one perturbed version of HM Until now, this scheme was exempt from cryptanalysis We first present a distinguisher which uses a differential property of the public key This distinguisher permits to break one perturbed version of HM After that, we describe a practical message-recovery attack against HM using Grobner bases The attack can be mounted in few hundreds seconds for recommended parameters It turns out that algebraic systems arising in HM are easier to solve than random systems of the same sue Note that this fact provides another distinguisher for HM Interestingly enough, we offer an explanation why algebraic systems arising in HM are easy to solve in practice Briefly, this is due to the apparition of many new linear and quadratic equations during the Grobner basis computation More precisely, we provide an upper bound on the maximum degree reached during the Grobner basis computation (a k a the degree of regularity) of HM systems For F-2, which is the initial and usual setting of HM, the degree of regularity is upper-bounded by 3 In general, this degree of regularity is upper-bounded by 4 These bounds allow a polynomial-time solving of the system given by the public equations in any case All in all, we consider that the HM scheme is broken for all practical parameters
更多
查看译文
关键词
bner basis computation,algebraic system,HM scheme,HM system,so-called HM cryptosystem,maximum degree,bner base,efficient cryptanalysis,practical message-recovery attack,practical parameter,hidden matrix cryptosystem
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要