2008
DOI: 10.1007/978-3-540-68914-0_15
|View full text |Cite
|
Sign up to set email alerts
|

New Differential-Algebraic Attacks and Reparametrization of Rainbow

Abstract: Abstract. A recently proposed class of multivariate Public-Key Cryptosystems, the Rainbow-Like Digital Signature Schemes, in which successive sets of central variables are obtained from previous ones by solving linear equations, seem to lead to e cient schemes (TTS, TRMS, and Rainbow) that perform well on systems of low computational resources. Recently SFLASH (C * − ) was broken by Dubois, Fouque, Shamir, and Stern via a di erential attack. In this paper, we exhibit similar algebraic and di ential attacks, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0
2

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 90 publications
(59 citation statements)
references
References 21 publications
0
55
0
2
Order By: Relevance
“…To execute a private map, we replace the "minus" components if needed, invert T , invert Q, invert S, and if needed verify a prefix/perturbation. Most small-field MPKCs -TTS, Rainbow, oil-and-vinegar [11,12,17,29] seem to behave the same over small odd prime fields and over F 2 k . Big-field MPKCs in odd-characteristic were mentioned in [35], but not much researched until recently.…”
Section: Background On Mpkcsmentioning
confidence: 93%
See 2 more Smart Citations
“…To execute a private map, we replace the "minus" components if needed, invert T , invert Q, invert S, and if needed verify a prefix/perturbation. Most small-field MPKCs -TTS, Rainbow, oil-and-vinegar [11,12,17,29] seem to behave the same over small odd prime fields and over F 2 k . Big-field MPKCs in odd-characteristic were mentioned in [35], but not much researched until recently.…”
Section: Background On Mpkcsmentioning
confidence: 93%
“…In 2004, traditional signature schemes using RSA or ECC are much slower than TTS/4 and SFLASH [1,10,37], but the latter have both been broken [17,18]. Although TTS/7 and 3IC-p seem ok today [8], the impending doom of SHA-1 [33] will force longer message digests and thus slower MPKCs while leaving RSA untouched.…”
Section: History and Questionsmentioning
confidence: 99%
See 1 more Smart Citation
“…To cover these, we have to adapt the upper formula slightly. So, a cryptosystem, which shall be secure in the year y, must reach the security level To translate this security bound into the corresponding number of field multiplications, we use a data-point computed by J. Ding et al in [DY08]. There the authors solve a system of 37 quadratic equations in 22 variables over GF (2 8 ) in about 1.06 · 10 6 seconds on a single 2.2 GHz Opteron machine by XL-Wiedemann.…”
Section: The Modelmentioning
confidence: 99%
“…A good overview of these attacks can be found in [GC00]. Special attacks on Rainbow-like schemes were proposed by Ding and Yang in [DY08]. There have also been some attempts to derive appropriate parameters from the complexities of these attacks [CC08].…”
Section: Introductionmentioning
confidence: 99%