Skip to main content
Top

2021 | OriginalPaper | Chapter

On the Effect of Projection on Rank Attacks in Multivariate Cryptography

Authors : Morten Øygarden, Daniel Smith-Tone, Javier Verbel

Published in: Post-Quantum Cryptography

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The multivariate scheme HFEv- used to be considered a promising candidate for a post-quantum signature system. First suggested in the early 2000s, a version of the scheme made it to the third round of the ongoing NIST post-quantum standardization process. In late 2020, the system suffered from an efficient rank attack due to Tao, Petzoldt, and Ding. In this paper, we inspect how this recent rank attack is affected by the projection modification. This modification was introduced to secure the signature scheme PFLASH against its predecessor’s attacks. We prove upper bounds for the rank of projected HFEv- (pHFEv-) and PFLASH under the new attack, which are tight for the experiments we have performed. We conclude that projection could be a useful tool in protecting against this recent cryptanalysis.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
This is a slight abuse of notation from the S defined in Sect. 2, which had \(\mathbb {F}_q^{n - p}\) as its domain. This is easily remedied by composing with a projection along the \(n -p\) first coordinates.
 
2
Following our slight abuse of notation when compared with Sect. 2: \(U'\) will now be an invertible linear map \(\mathbb {F}_q^{n + v}\rightarrow \mathbb {F}_q^{n + v}\).
 
3
Any mention of commercial products does not indicate endorsement by NIST.
 
Literature
2.
go back to reference Bettale, L., Faugère, J.-C., Perret, L.: Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. Des. Codes Cryptogr. 69(1), 1–52 (2013)MathSciNetCrossRef Bettale, L., Faugère, J.-C., Perret, L.: Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. Des. Codes Cryptogr. 69(1), 1–52 (2013)MathSciNetCrossRef
4.
go back to reference Bosma, W., Cannon, J., Playoust, C.: The magma algebra system i: the user language. J. Symb. Comput. 24(3–4), 235–265 (1997)MathSciNetCrossRef Bosma, W., Cannon, J., Playoust, C.: The magma algebra system i: the user language. J. Symb. Comput. 24(3–4), 235–265 (1997)MathSciNetCrossRef
5.
go back to reference Cantor, D., Kaltofen, E.: On fast multiplication of polynomials over arbitrary algebras. Acta Informatica 28, 693–701 (1991)MathSciNetCrossRef Cantor, D., Kaltofen, E.: On fast multiplication of polynomials over arbitrary algebras. Acta Informatica 28, 693–701 (1991)MathSciNetCrossRef
9.
go back to reference Chen, M.-S., Yang, B.-Y., Smith-Tone, D.: PFLASH-secure asymmetric signatures on smart cards. In: Lightweight Cryptography Workshop (2015) Chen, M.-S., Yang, B.-Y., Smith-Tone, D.: PFLASH-secure asymmetric signatures on smart cards. In: Lightweight Cryptography Workshop (2015)
15.
go back to reference Faugère, J.-C.: A new efficient algorithm for computing Gröbner bases (F4). J. Pure and Appl. Algebra 139(1–3), 61–88 (1999)MathSciNetCrossRef Faugère, J.-C.: A new efficient algorithm for computing Gröbner bases (F4). J. Pure and Appl. Algebra 139(1–3), 61–88 (1999)MathSciNetCrossRef
16.
go back to reference Le Gall, F.: Powers of tensors and fast matrix multiplication. In: Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, pp. 296–303 (2014) Le Gall, F.: Powers of tensors and fast matrix multiplication. In: Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, pp. 296–303 (2014)
Metadata
Title
On the Effect of Projection on Rank Attacks in Multivariate Cryptography
Authors
Morten Øygarden
Daniel Smith-Tone
Javier Verbel
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-81293-5_6

Premium Partner