【24h】

Could SFLASH be Repaired?

机译:可以修复sflash吗?

获取原文
获取外文期刊封面目录资料

摘要

The SFLASH signature scheme stood for a decade as the most successful cryptosystem based on multivariate polynomials, before an efficient attack was finally found in 2007. In this paper, we review its recent cryptanalysis and we notice that its weaknesses can all be linked to the fact that the cryptosystem is built on the structure of a large field. As the attack demonstrates, this richer structure can be accessed by an attacker by using the specific symmetry of the core function being used. Then, we investigate the effect of restricting this large field to a purely linear subset and we find that the symmetries exploited by the attack are no longer present. At a purely defensive level, this defines a countermeasure which can be used at a moderate overhead. On the theoretical side, this informs us of limitations of the recent attack and raises interesting remarks about the design itself of multivariate schemes.
机译:在2007年终于发现了高效攻击之前,SFLASH签名计划将成为基于多变量多项式的最成功的密码系统。在本文中,我们审查了其最近的密码分析,我们注意到其弱点都可以与事实相关联密码系统是基于大场的结构构建的。由于攻击演示,攻击者可以通过使用所使用的核心功能的特定对称来访问这种更丰富的结构。然后,我们调查将该大场限制为纯线性子集的效果,并发现攻击利用的对称不再存在。在纯粹的防守级别,这定义了可以在适度的开销中使用的对策。在理论方面,这通知我们最近攻击的局限性,并提出了关于多元计划的设计本身的有趣言论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号