Skip to main content
Erschienen in: Applicable Algebra in Engineering, Communication and Computing 3-4/2020

17.04.2020 | Original Paper

Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures

verfasst von: Boo Barkee, Michela Ceria, Theo Moriarty, Andrea Visconti

Erschienen in: Applicable Algebra in Engineering, Communication and Computing | Ausgabe 3-4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In 1994, Moss Sweedler’s dog proposed a cryptosystem, known as Barkee’s Cryptosystem, and the related cryptanalysis. Its explicit aim was to dispel the proposal of using the urban legend that “Gröbner bases are hard to compute”, in order to devise a public key cryptography scheme. Therefore he claimed that “no scheme using Gröbner bases will ever work”. Later, further variations of Barkee’s Cryptosystem were proposed on the basis of another urban legend, related to the infiniteness (and consequent uncomputability) of non-commutative Gröbner bases; unfortunately Pritchard’s algorithm for computing (finite) non-commutative Gröbner bases was already available at that time and was sufficient to crash the system proposed by Ackermann and Kreuzer. The proposal by Rai, where the private key is a principal ideal and the public key is a bunch of polynomials within this principal ideal, is surely immune to Pritchard’s attack but not to Davenport’s factorization algorithm. It was recently adapted specializing and extending Stickel’s Diffie–Hellman protocols in the setting of Ore extension. We here propose a further generalization and show that such protocols can be broken simply via polynomial division and Buchberger reduction.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
To be chosen e.g in the set
$$\begin{aligned} {\mathcal{A}} := X \cup \{x_ix_j^{-1} : x_i,x_j\in X\}\cup \{x_ix_j : x_i,x_j\in X\} \cup \{x_ix_jx_i^{-1}x_j^{-1} : x_i,x_j\in X\}. \end{aligned}$$
 
2
which perhaps could be true if, instead of using the most efficient implementations [32, 35] of Buchberger’s algorithm [8, 9] based on Möller Lifting Theorem [50], the decypher applies the obsolete S-polynomial test/completion [10], but is definitely false if Gröbner bases are produced either with Macaulay-like algorithms [43, 44] as Faugère’s \(F_4\) [26] and \(F_5\) [27] or with involutive algorithms [33, 34] based on Janet theory [40].
 
3
Given a finite set of terms \(m_1,\ldots ,m_r\in \mathcal {T}\) let us construct, by repeated GCDs, a finite sequence— a sequence and not just a set—\(M := [n_1,\ldots ,n_s] \subset \mathcal {T}\) and subsets \(J_i \subset \{1,\ldots ,s\}\)\(1\le i \le r,\) such that
  • for each \(i, 1\le i \le r,\)\(m_i = \prod \nolimits _{l\in J_i} n_l\);
  • for each \(i,j, 1\le i < j \le r,\)\(\mathrm{lcm}(m_i,m_j) = \prod \nolimits _{l\in J_i\cup J_j} n_l.\)
Now let us choose, for each \(l, 1 \le l \le s\), an element \(h_l\in {\mathcal{P}}\) such that \(\mathbf{T}(h_l) < n_l\) and let us define
  • \(\gamma _l := n_l-h_l,\) for each \(l, 1 \le l \le s,\)
  • \(g_i := \prod \nolimits _{l\in J_i} \gamma _l,\) for each \(i, 1\le i \le r.\)
Then \(G = \{g_i. 1\le i\le r\}\) is a Gröbner basis such that \(\mathbf{T}(G) = (m_1,\ldots ,m_r)\).
 
4
\({\mathcal{O}}(\mathsf{T}^4(\delta ))\) where \(\delta := \max (\deg (\tau ) : \tau \in \mathbf{G}_\prec (\mathsf{I}) = {\mathcal{O}}(d^{n2^n}).\)
 
5
notwithstanding that Pritchard [58] had already formulated an adaptation of the Fantomas Attack
 
6
If the sequence is finite \(F := \{f_i,u\ge i \ge 1\}\) we can simply set, for each \(i>u\) either \(f_i:=0\) or \(f_i:=f_u\).
 
7
id est a term ordering \(\prec\) on \(\mathcal {T}^m\) is called sequential if for each \(\tau \in \langle X_1,\ldots ,X_n\rangle ^m\) the set \(\{\omega \in \langle X_1,\ldots ,X_n\rangle : \omega \prec \tau \}^m\) is finite.
 
Literatur
1.
Zurück zum Zitat Ackermann, P., Kreuzer, M.: Gröbner basis cyptosystems. J. Appl. Alg. 17, 173–194 (2006)MATH Ackermann, P., Kreuzer, M.: Gröbner basis cyptosystems. J. Appl. Alg. 17, 173–194 (2006)MATH
2.
Zurück zum Zitat Albrecht, M.R., Farshim, P., Faugère, J.-C., Perret, L.: Polly Cracker, Revisited. L.N.C.S 7073, 179–196 (2011)MathSciNetMATH Albrecht, M.R., Farshim, P., Faugère, J.-C., Perret, L.: Polly Cracker, Revisited. L.N.C.S 7073, 179–196 (2011)MathSciNetMATH
3.
Zurück zum Zitat Albrecht, M.R., Farshim, P., Faugère, J.-C., Perret, L.: Polly Cracker, revisited. Des. Codes Cryptogr. 79, 261–302 (2016)MathSciNetCrossRef Albrecht, M.R., Farshim, P., Faugère, J.-C., Perret, L.: Polly Cracker, revisited. Des. Codes Cryptogr. 79, 261–302 (2016)MathSciNetCrossRef
4.
Zurück zum Zitat Alonso, M.E., Marinari, M.G., Mora, T.: Oracle-supported drawing of the Gröbner éscalier”. preprint (2008) Alonso, M.E., Marinari, M.G., Mora, T.: Oracle-supported drawing of the Gröbner éscalier”. preprint (2008)
5.
Zurück zum Zitat Backelin, J., Cojocaru, S., Ufnarovski, V.: Mathematical Computations using Bergman Lund University Backelin, J., Cojocaru, S., Ufnarovski, V.: Mathematical Computations using Bergman Lund University
6.
Zurück zum Zitat Barkee, B., Can, D.C., Ecks, J., Moriarty, T., Ree, R.F.: Why you cannot even hope to use Gröbner Bases in Public Key Cryptography. J. Symb. Comp. 18, 497–501 (1994)CrossRef Barkee, B., Can, D.C., Ecks, J., Moriarty, T., Ree, R.F.: Why you cannot even hope to use Gröbner Bases in Public Key Cryptography. J. Symb. Comp. 18, 497–501 (1994)CrossRef
7.
Zurück zum Zitat Billet, O., Patarin, J., Seurin, Y.: Analysis of Intermediate Field Systems, eprint iacr 542 (2009) Billet, O., Patarin, J., Seurin, Y.: Analysis of Intermediate Field Systems, eprint iacr 542 (2009)
8.
Zurück zum Zitat Buchberger, B.: Ein Algorithmus zum Auffinden der Basiselemente des Restklassenringes nach einem nulldimensionalen Polynomideal. Ph. D. Thesis, Innsbruck (1965) Buchberger, B.: Ein Algorithmus zum Auffinden der Basiselemente des Restklassenringes nach einem nulldimensionalen Polynomideal. Ph. D. Thesis, Innsbruck (1965)
9.
Zurück zum Zitat Buchberger, B.: Ein algorithmisches Kriterium für die Lösbarkeit eines algebraischen Gleischunssystem. Aeq. Math. 4, 374–383 (1970)CrossRef Buchberger, B.: Ein algorithmisches Kriterium für die Lösbarkeit eines algebraischen Gleischunssystem. Aeq. Math. 4, 374–383 (1970)CrossRef
10.
Zurück zum Zitat Buchberger, B.: A Criterion for Detecting Unnecessary Reduction in the Construction of Gröbner bases. L.N.C.S 72, 3–21 (1979)MATH Buchberger, B.: A Criterion for Detecting Unnecessary Reduction in the Construction of Gröbner bases. L.N.C.S 72, 3–21 (1979)MATH
11.
Zurück zum Zitat Buchberger, B.: Miscellaneours Results on Groebner Bases for Polynomial Ideals II. Technical Report 83/1, University of Delaware, Department of Computer and Information Sciences, p. 31 (1983) Buchberger, B.: Miscellaneours Results on Groebner Bases for Polynomial Ideals II. Technical Report 83/1, University of Delaware, Department of Computer and Information Sciences, p. 31 (1983)
12.
Zurück zum Zitat Buchberger, B.: Gröbner bases computation by triangularizing Macaulay matrices. The 50th Anniversary of Gröbner Bases. Mathematical Society of Japan (2018) Buchberger, B.: Gröbner bases computation by triangularizing Macaulay matrices. The 50th Anniversary of Gröbner Bases. Mathematical Society of Japan (2018)
14.
15.
Zurück zum Zitat Caboara, M., Caruso, F., Traverso, C.: Gröbner bases for public key cryptography. To appear on ACM Press, New York, ISSAC 08: Proceedings of the 2008 International Symposium on Symbolic and Algebraic Computation Caboara, M., Caruso, F., Traverso, C.: Gröbner bases for public key cryptography. To appear on ACM Press, New York, ISSAC 08: Proceedings of the 2008 International Symposium on Symbolic and Algebraic Computation
16.
Zurück zum Zitat Caboara, M., Caruso, F., Traverso, C.: Block lattice polly cracker, theory and practice. Second Workshop on Mathematical Cryptology, Santander, 24-27 Ottobre (2008). pp. 75–82. [Extended Abstract] Caboara, M., Caruso, F., Traverso, C.: Block lattice polly cracker, theory and practice. Second Workshop on Mathematical Cryptology, Santander, 24-27 Ottobre (2008). pp. 75–82. [Extended Abstract]
17.
Zurück zum Zitat Caboara, M., Caruso, F., Traverso, C.: Heterogeneous lattice metrics and the NTWO cryptosystem Second Workshop on Mathematical Cryptology , Santander, 24-27 Ottobre (2008). pp. 118–121 Caboara, M., Caruso, F., Traverso, C.: Heterogeneous lattice metrics and the NTWO cryptosystem Second Workshop on Mathematical Cryptology , Santander, 24-27 Ottobre (2008). pp. 118–121
18.
Zurück zum Zitat Caboara, M., Caruso, F., Traverso, C.: Block Lattice Polly Cracker: design, implementation and security. J. Symb. Comput. 46(5), 534–549 (2011)CrossRef Caboara, M., Caruso, F., Traverso, C.: Block Lattice Polly Cracker: design, implementation and security. J. Symb. Comput. 46(5), 534–549 (2011)CrossRef
21.
Zurück zum Zitat Ceria, M., Mora, T.: Buchberger–Zacharias theory of multivariate Ore extensions. J. Pure Appl. Algebra 221(12), 2974–3026 (2017)MathSciNetCrossRef Ceria, M., Mora, T.: Buchberger–Zacharias theory of multivariate Ore extensions. J. Pure Appl. Algebra 221(12), 2974–3026 (2017)MathSciNetCrossRef
23.
Zurück zum Zitat Cojocaru, S., Ufnarovski, V.: Noncommuatative Gröbner basis, Hilbert series, Anick’s resolution and BERGMAN under MS-DOS. Comput. Sci. J. Moldova 3, 24–39 (1995) Cojocaru, S., Ufnarovski, V.: Noncommuatative Gröbner basis, Hilbert series, Anick’s resolution and BERGMAN under MS-DOS. Comput. Sci. J. Moldova 3, 24–39 (1995)
24.
Zurück zum Zitat Dickenstein, A., Fitchas, N., Giusti, M., Sessa, C.: The membership problem for unmixed polynomial ideals is solvable in single exponential time. Discrete Appl. Math. 33, 73–94 (1991)MathSciNetCrossRef Dickenstein, A., Fitchas, N., Giusti, M., Sessa, C.: The membership problem for unmixed polynomial ideals is solvable in single exponential time. Discrete Appl. Math. 33, 73–94 (1991)MathSciNetCrossRef
25.
Zurück zum Zitat Dubé, T.W.: The Structure of Polynomial Ideals and Gröbner Bases SIAM J. Comput. 19(4) (2006) Dubé, T.W.: The Structure of Polynomial Ideals and Gröbner Bases SIAM J. Comput. 19(4) (2006)
26.
Zurück zum Zitat Faugère, J.-C.: A new efficient algorithm for computating Gröbner bases (\(F_4\)). J. Pure Appl. Algebra 139, 61–88 (1999)MathSciNetCrossRef Faugère, J.-C.: A new efficient algorithm for computating Gröbner bases (\(F_4\)). J. Pure Appl. Algebra 139, 61–88 (1999)MathSciNetCrossRef
27.
Zurück zum Zitat Faugère, J.-C.: A new efficient algorithm for computating Gröbner bases without reduction to zero (\(F_5\)), Proc. ISSAC 2002, 75–83, ACM (2002) Faugère, J.-C.: A new efficient algorithm for computating Gröbner bases without reduction to zero (\(F_5\)), Proc. ISSAC 2002, 75–83, ACM (2002)
28.
Zurück zum Zitat J-C.Faugère, A. Joux, Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Grobner Bases, In Dan Boneh, editor, Ad-vances in Cryptology—CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science. UK: Springer, pp. 44–60 (2003) J-C.Faugère, A. Joux, Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Grobner Bases, In Dan Boneh, editor, Ad-vances in Cryptology—CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science. UK: Springer, pp. 44–60 (2003)
29.
Zurück zum Zitat Fellows, M.R., Koblitz, N.: Kid krypto. Advances in Cryptography - Crypto’92. Lect. N. Comp. Sci. 740, 371–389 (1993)CrossRef Fellows, M.R., Koblitz, N.: Kid krypto. Advances in Cryptography - Crypto’92. Lect. N. Comp. Sci. 740, 371–389 (1993)CrossRef
30.
Zurück zum Zitat Fellows, M.R., Koblitz, N.: Combinatorially based cryptography for children (and adults). Congressus Numer. 99, 9–41 (1994)MathSciNetMATH Fellows, M.R., Koblitz, N.: Combinatorially based cryptography for children (and adults). Congressus Numer. 99, 9–41 (1994)MathSciNetMATH
31.
32.
Zurück zum Zitat Gebauer, R., Möller, H.M.: On an Installation of Buchbgerger’s Algorithm. J. Symb. Comp. 6, 275–286 (1988)CrossRef Gebauer, R., Möller, H.M.: On an Installation of Buchbgerger’s Algorithm. J. Symb. Comp. 6, 275–286 (1988)CrossRef
33.
35.
Zurück zum Zitat Giovini, A., et al.: “One sugar cube, please” OR Selection strategies in the Buchberger algorithm, Proc. ISSAC ’91, 49–54, ACM (1991) Giovini, A., et al.: “One sugar cube, please” OR Selection strategies in the Buchberger algorithm, Proc. ISSAC ’91, 49–54, ACM (1991)
36.
Zurück zum Zitat Green, E.L., Mora, T., Ufnarovski, V.: The non-commutative Gröbner freaks. Progress Comput. Sci. Appl. Logic 15, 93–104 (1991). BirkhäuserMATH Green, E.L., Mora, T., Ufnarovski, V.: The non-commutative Gröbner freaks. Progress Comput. Sci. Appl. Logic 15, 93–104 (1991). BirkhäuserMATH
37.
Zurück zum Zitat Hermann, G.: Die Frage der endlich vielen Schritte in die Theorie der Polynomideale. Math. Ann. 95, 736–788 (1926)MathSciNetCrossRef Hermann, G.: Die Frage der endlich vielen Schritte in die Theorie der Polynomideale. Math. Ann. 95, 736–788 (1926)MathSciNetCrossRef
38.
Zurück zum Zitat Kandri-Rody, A., Weispfenning, W.: Non-commutative Gröbner Bases in Algebras of Solvable Type. J. Symb. Comp. 9, 1–26 (1990)CrossRef Kandri-Rody, A., Weispfenning, W.: Non-commutative Gröbner Bases in Algebras of Solvable Type. J. Symb. Comp. 9, 1–26 (1990)CrossRef
39.
Zurück zum Zitat Kanwal, S., Inam, S., Ali, R.., Qiu, S.: Two new variants of stickel’s key exchange protocol based on polynomials over noncommutative rings Kanwal, S., Inam, S., Ali, R.., Qiu, S.: Two new variants of stickel’s key exchange protocol based on polynomials over noncommutative rings
40.
Zurück zum Zitat Janet, M.: Sur les systèmes d’équations aux dérivées partielles. J. Math. Pure et Appl. 3, 65–151 (1920)MATH Janet, M.: Sur les systèmes d’équations aux dérivées partielles. J. Math. Pure et Appl. 3, 65–151 (1920)MATH
41.
Zurück zum Zitat Levy-dit-Vehel, F., Marinari, M.G., Perret, L., Traverso, C.: A Survey on Polly Cracker Systems in Sala, M., et al. (Ed.) Gröbner bases, Coding, Cryptography, Springer Risc XVI, pp. 285–305 (2009) Levy-dit-Vehel, F., Marinari, M.G., Perret, L., Traverso, C.: A Survey on Polly Cracker Systems in Sala, M., et al. (Ed.) Gröbner bases, Coding, Cryptography, Springer Risc XVI, pp. 285–305 (2009)
42.
Zurück zum Zitat Levy-dit-Vehel, F., Perret, L.: A Polly Cracker system based on satisfiability. Progress Comput. Sci. Appl. Logic 23, 177–192 (2004)MathSciNetMATH Levy-dit-Vehel, F., Perret, L.: A Polly Cracker system based on satisfiability. Progress Comput. Sci. Appl. Logic 23, 177–192 (2004)MathSciNetMATH
43.
Zurück zum Zitat Macaulay, F.S.: On the resolution of a given modular system into primary systems including some properties of Hilbert Numbers. Math. Ann. 74, 66–121 (1913)MathSciNetCrossRef Macaulay, F.S.: On the resolution of a given modular system into primary systems including some properties of Hilbert Numbers. Math. Ann. 74, 66–121 (1913)MathSciNetCrossRef
44.
Zurück zum Zitat Macaulay, F.S.: The Algebraic Theory of Modular Systems. Cambridge Univ. Press, Cambridge (1916)MATH Macaulay, F.S.: The Algebraic Theory of Modular Systems. Cambridge Univ. Press, Cambridge (1916)MATH
45.
Zurück zum Zitat Madlener, K., Reinert, B.: Computing Gröbner bases in monoid and group rings, Proc. ISSAC ’93, ACM, pp. 254–263 (1993) Madlener, K., Reinert, B.: Computing Gröbner bases in monoid and group rings, Proc. ISSAC ’93, ACM, pp. 254–263 (1993)
48.
Zurück zum Zitat Mårtensson, K.: An algorithm to detect regular behaviour of binomial Gröbner Basis rational language. Master’s Thesis, Lund University (2006) Mårtensson, K.: An algorithm to detect regular behaviour of binomial Gröbner Basis rational language. Master’s Thesis, Lund University (2006)
49.
Zurück zum Zitat Micciancio, D., Peikert, C.: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. L.N.C.S 7237, 700–718 (2010)MathSciNetMATH Micciancio, D., Peikert, C.: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. L.N.C.S 7237, 700–718 (2010)MathSciNetMATH
50.
Zurück zum Zitat Möller, H.M.: On the construction of Gröbner bases using syzygies. J. Symb. Comp. 6, 345–359 (1988)CrossRef Möller, H.M.: On the construction of Gröbner bases using syzygies. J. Symb. Comp. 6, 345–359 (1988)CrossRef
51.
Zurück zum Zitat Mora, F.: De Nugis Groebnerialium 2: Applying Macaulay’s Trick in order to easily write a Groebner basis. J. Appl. Alg.(2003) Mora, F.: De Nugis Groebnerialium 2: Applying Macaulay’s Trick in order to easily write a Groebner basis. J. Appl. Alg.(2003)
53.
Zurück zum Zitat Mora, T.: Solving Polynomial Equation Systems 4 Vols., Cambridge University Press, I (2003), II (2005), III (2015), IV (2016) Mora, T.: Solving Polynomial Equation Systems 4 Vols., Cambridge University Press, I (2003), II (2005), III (2015), IV (2016)
54.
Zurück zum Zitat Mullan, C.: Some results in group-based cryptography, Technical report, Department of Mathematics, Royal Holloway, University of London (2012) Mullan, C.: Some results in group-based cryptography, Technical report, Department of Mathematics, Royal Holloway, University of London (2012)
56.
Zurück zum Zitat Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, In Ueli M. Maurer, editor, Advances in Cryptology—EUROCRYPT’96, volume 1070 of Lecture Notes in Com-puter Science, pages 33–48. Springer (1996) Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, In Ueli M. Maurer, editor, Advances in Cryptology—EUROCRYPT’96, volume 1070 of Lecture Notes in Com-puter Science, pages 33–48. Springer (1996)
57.
Zurück zum Zitat Pesch, M.: Gröbner bases in skew polynomial rings. Dissertation, Passau (1997) Pesch, M.: Gröbner bases in skew polynomial rings. Dissertation, Passau (1997)
58.
Zurück zum Zitat Pritchard, F.L.: The ideal membership problem in non-commutative polynomial rings. J. Symb. Comp. 22, 27–48 (1996)MathSciNetCrossRef Pritchard, F.L.: The ideal membership problem in non-commutative polynomial rings. J. Symb. Comp. 22, 27–48 (1996)MathSciNetCrossRef
59.
Zurück zum Zitat Rai, T.S.: Infinite Gröbner bases and Noncommutative Polly Cracker Cryptosystems PhD Thesis, Virginia Polytechnique Institute and State Univ. (2004) Rai, T.S.: Infinite Gröbner bases and Noncommutative Polly Cracker Cryptosystems PhD Thesis, Virginia Polytechnique Institute and State Univ. (2004)
61.
Zurück zum Zitat Reinert, B.: On Gröbner Bases in Monoid and Group Rings, Thesis. Kaiserslautern (1995) Reinert, B.: On Gröbner Bases in Monoid and Group Rings, Thesis. Kaiserslautern (1995)
62.
Zurück zum Zitat Shpilrain, V.: Cryptanalysis of Stickel’s key exchange scheme. Proc. Comput. Sci. Russia 5010, 283–288 (2008)MATH Shpilrain, V.: Cryptanalysis of Stickel’s key exchange scheme. Proc. Comput. Sci. Russia 5010, 283–288 (2008)MATH
63.
64.
Zurück zum Zitat Sramka, M.: On the security of stickel’s key exchange scheme. JCMCC 66 (2008) Sramka, M.: On the security of stickel’s key exchange scheme. JCMCC 66 (2008)
65.
Zurück zum Zitat Stickel, E.: A new method for exchanging secret key, Proceedings of the Third International Conference on Information Technology and Applications (ICITA’05), 426–430. Sidney, Australia (2005) Stickel, E.: A new method for exchanging secret key, Proceedings of the Third International Conference on Information Technology and Applications (ICITA’05), 426–430. Sidney, Australia (2005)
66.
Zurück zum Zitat Steinwandt, R., Geiselmann, W., Endsuleit, R.: Attacking a polynomial-based cryptosystem: Polly Cracker. Int. J. Inf. Secur. 1, 143–148 (2002)CrossRef Steinwandt, R., Geiselmann, W., Endsuleit, R.: Attacking a polynomial-based cryptosystem: Polly Cracker. Int. J. Inf. Secur. 1, 143–148 (2002)CrossRef
67.
Zurück zum Zitat Steinwandt, R., Geiselmann, W.: Cryptoasnalysis of Polly Cracker. IEEE Trans. Inf. Th. 48(11), 2990–1 (2002)CrossRef Steinwandt, R., Geiselmann, W.: Cryptoasnalysis of Polly Cracker. IEEE Trans. Inf. Th. 48(11), 2990–1 (2002)CrossRef
68.
Zurück zum Zitat Hofheinz, D., Steinwandt, R.: A “Differential” Attack on Polly Cracker. Int. J. Inf. Secur. 1, 143–148 (2002)CrossRef Hofheinz, D., Steinwandt, R.: A “Differential” Attack on Polly Cracker. Int. J. Inf. Secur. 1, 143–148 (2002)CrossRef
69.
Zurück zum Zitat Wagner, N.R., Magyarik, M.R.: A Publyc-Key Cryptosystem based on the Word Problem. L. N. Comp. Sci 196, 19–36 (1985). SpringerMATH Wagner, N.R., Magyarik, M.R.: A Publyc-Key Cryptosystem based on the Word Problem. L. N. Comp. Sci 196, 19–36 (1985). SpringerMATH
Metadaten
Titel
Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures
verfasst von
Boo Barkee
Michela Ceria
Theo Moriarty
Andrea Visconti
Publikationsdatum
17.04.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Applicable Algebra in Engineering, Communication and Computing / Ausgabe 3-4/2020
Print ISSN: 0938-1279
Elektronische ISSN: 1432-0622
DOI
https://doi.org/10.1007/s00200-020-00428-w

Weitere Artikel der Ausgabe 3-4/2020

Applicable Algebra in Engineering, Communication and Computing 3-4/2020 Zur Ausgabe