2006 | OriginalPaper | Buchkapitel
Cryptanalysis of 2R− Schemes
verfasst von : Jean-Charles Faugère, Ludovic Perret
Erschienen in: Advances in Cryptology - CRYPTO 2006
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
In this paper, we study the security of 2R
−
schemes [17,18], which are the “minus variant” of two-round schemes. This variant consists in removing some of the
n
polynomials of the public key, and permits to thwart an attack described at Crypto’99 [25] against two-round schemes. Usually, the “minus variant” leads to a real strengthening of the considered schemes. We show here that this is actually not true for 2R
−
schemes. We indeed propose an efficient algorithm for decomposing 2R
−
schemes. For instance, we can remove up to
$\left \lfloor\frac{n}{2} \right \rfloor$
equations and still be able to recover a decomposition in
O
(
n
12
). We provide experimental results illustrating the efficiency of our approach. In practice, we have been able to decompose 2R
−
schemes in less than a handful of hours for most of the challenges proposed by the designers [18]. We believe that this result makes the principle of two-round schemes, including 2R
−
schemes, useless.