2021
DOI: 10.1016/j.tcs.2021.09.043
|View full text |Cite
|
Sign up to set email alerts
|

New complexity estimation on the Rainbow-Band-Separation attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

4
0

Authors

Journals

citations
Cited by 4 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…Polynomial systems solved in the Rainbow-Band-Separation attack and the MinRank attack with the Kipnis-Shamir modeling are multi-graded, and we further show that the condition for the order of a field in our results is satisfied in these attacks against multivariate cryptosystems proposed in NIST PQC 2nd round. In particular, our result gives a theoretical background for the precise security analysis in [22,23] since their values are specific cases of D Z s ≥0 . Consequently, under a reasonable condition for the order of a field, we clear a relation between the first fall degree and the degree of regularity and provide a theoretical method using a multivariate power series for cryptanalysis.…”
Section: Our Contributionmentioning
confidence: 87%
See 3 more Smart Citations
“…Polynomial systems solved in the Rainbow-Band-Separation attack and the MinRank attack with the Kipnis-Shamir modeling are multi-graded, and we further show that the condition for the order of a field in our results is satisfied in these attacks against multivariate cryptosystems proposed in NIST PQC 2nd round. In particular, our result gives a theoretical background for the precise security analysis in [22,23] since their values are specific cases of D Z s ≥0 . Consequently, under a reasonable condition for the order of a field, we clear a relation between the first fall degree and the degree of regularity and provide a theoretical method using a multivariate power series for cryptanalysis.…”
Section: Our Contributionmentioning
confidence: 87%
“…In particular, since q > d ff by Theorem 4.5, the assumption (3) holds and the second half of Theorem 4.5 holds. Namely, the value D Z 2 ≥0 in the paper [22] gives an upper bound for the first fall degree d ff . Furthermore, Perlner and Smith-Tone [26] propose a Gröbner basis algorithm that arranges polynomials arisen from the RBS dominant system with respect to a well-ordering on Z 2 ≥0 and further improves the complexity of the attack.…”
Section: Application To Multivariate Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…In the KS method, although the bi-degree has been investigated [16], each KS system always has the multi-degree, and the solving complexity is influenced by this property. In this paper, in order to approximate the solving degree of each KS system, a theoretical value defined using its multi-degree is introduced, as a natural generalization of the theoretical value defined from bi-degrees in [20]. This theoretical value is also available for the hybrid approach [4], which, after fixing some variables, solves a given system, e.g.…”
Section: Our Contributionmentioning
confidence: 99%