首页> 外文会议>Public-key cryptography - PKC 2015 >A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
【24h】

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems

机译:对MQQ密码系统的多项式时间密钥恢复攻击

获取原文
获取原文并翻译 | 示例

摘要

We investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties. In particular, the MQQ-SIG signature scheme is the fastest scheme in the ECRYPT benchmarking of cryptographic systems (eBACS). We show that both the signature scheme MQQ-SIG and the encryption scheme MQQ-ENC, although using different types of MQQs, share a common algebraic structure that introduces a weakness in both schemes. We use this weakness to mount a successful polynomial time key-recovery attack that finds an equivalent key using the idea of so-called good keys. In the process we need to solve a MinRank problem that, because of the structure, can be solved in polynomial-time assuming some mild algebraic assumptions. We highlight that our theoretical results work in characteristic 2 which is known to be the most difficult case to address in theory for MinRank attacks and also without any restriction on the number of polynomials removed from the public-key. This was not the case for previous MinRank like-attacks against MQ schemes. From a practical point of view, we are able to break an MQQ-SIG instance of 80 bits security in less than 2 days, and one of the more conservative MQQ-ENC instances of 128 bits security in little bit over 9 days. Altogether, our attack shows that it is very hard to design a secure public key scheme based on an easily invertible MQQ structure.
机译:我们使用多元二次拟群(MQQ)研究MQQ公钥密码系统家族的安全性。这些密码系统显示出特别好的性能。特别是,MQQ-SIG签名方案是密码系统ECRYPT基准测试(eBACS)中最快的方案。我们显示,签名方案MQQ-SIG和加密方案MQQ-ENC尽管使用了不同类型的MQQ,但它们共享一个共同的代数结构,这在这两种方案中都存在缺陷。我们利用这一弱点发起成功的多项式时间密钥恢复攻击,该攻击使用所谓的“好密钥”的概念找到等效密钥。在此过程中,我们需要解决一个MinRank问题,由于其结构,可以在假设一些温和的代数假设的情况下在多项式时间内求解。我们着重指出,我们的理论结果适用于特征2,这是MinRank攻击在理论上最难解决的情况,并且对从公钥中删除的多项式的数量也没有任何限制。以前针对MQ方案的MinRank类似攻击并非如此。从实际的角度来看,我们能够在不到2天的时间内破坏80位安全性的MQQ-SIG实例,而在9天之内就可以破坏更为保守的128位安全性的MQQ-ENC实例之一。总而言之,我们的攻击表明,基于易于逆转的MQQ结构设计安全的公共密钥方案非常困难。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号