2022
DOI: 10.1007/978-3-031-15982-4_13
|View full text |Cite
|
Sign up to set email alerts
|

Improving Support-Minors Rank Attacks: Applications to G$$\displaystyle e$$MSS and Rainbow

Abstract: The Support-Minors (SM) method has opened new routes to attack multivariate schemes with rank properties that were previously impossible to exploit, as shown by the recent attacks of [40] and [9] on the Round 3 NIST candidates GeMSS and Rainbow respectively. In this paper, we study this SM approach more in depth and we propose a greatly improved attack on GeMSS based on this Support-Minors method. Even though GeMSS was already affected by [40], our attack affects it even more and makes it completely unfeasib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 35 publications
(104 reference statements)
0
3
0
Order By: Relevance
“…In contrast, the attack of [109] is polynomial in the number of vinegar variables and is not affected greatly by the number of removed equations. This attack is further improved by the techniques in [264], where it is shown how to implement the much more efficient support minors MinRank approach [144] in the case that the solution is in an extension field.…”
Section: Sphincs +mentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, the attack of [109] is polynomial in the number of vinegar variables and is not affected greatly by the number of removed equations. This attack is further improved by the techniques in [264], where it is shown how to implement the much more efficient support minors MinRank approach [144] in the case that the solution is in an extension field.…”
Section: Sphincs +mentioning
confidence: 99%
“…The result undermines the basic design principles of HFEv-. Possible modifications to repair the scheme -such as abandoning the vinegar and minus modifiers and increasing the degree of the HFE polynomial to reach the target security level or adding a projection or plus modifier to thwart the new attacks, as suggested in [265] -would both represent too large a change to the original submission and render the performance of the resulting scheme unacceptable, as shown in [264]. Therefore, NIST decided not to advance GeMSS.…”
Section: Sphincs +mentioning
confidence: 99%
“…In contrast, the attack of [109] is polynomial in the number of vinegar variables and is not affected greatly by the number of removed equations. This attack is further improved by the techniques in [262], where it is shown how to implement the much more efficient support minors MinRank approach [144] in the case that the solution is in an extension field.…”
Section: Sphincs +mentioning
confidence: 99%
“…The result undermines the basic design principles of HFEv-. Possible modifications to repair the scheme -such as abandoning the vinegar and minus modifiers and increasing the degree of the HFE polynomial to reach the target security level or adding a projection or plus modifier to thwart the new attacks, as suggested in [263] -would both represent too large a change to the original submission and render the performance of the resulting scheme unacceptable, as shown in [262]. Therefore, NIST decided not to advance GeMSS.…”
Section: Sphincs +mentioning
confidence: 99%
See 1 more Smart Citation