TY - GEN
T1 - Breaking instance II of new TTM cryptosystems
AU - Nie, Xuyun
AU - Jiang, Xin
AU - Hu, Lei
AU - Ding, Jintai
AU - Qin, Zhiguang
PY - 2008
Y1 - 2008
N2 - TTM (Tame Transformation Method) is a type ofmultivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attacks, in particular, the Nie et al attack. The two instances are claimed to achieve a security of /2109 against Nie et al attack. Through computation, we found that the instance II satisfied First Order Linearization Equations. After finding all linearization equations, we can perform a ciphertext-only attack to break it.
AB - TTM (Tame Transformation Method) is a type ofmultivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attacks, in particular, the Nie et al attack. The two instances are claimed to achieve a security of /2109 against Nie et al attack. Through computation, we found that the instance II satisfied First Order Linearization Equations. After finding all linearization equations, we can perform a ciphertext-only attack to break it.
UR - http://www.scopus.com/inward/record.url?scp=54049088975&partnerID=8YFLogxK
U2 - 10.1109/IIH-MSP.2008.246
DO - 10.1109/IIH-MSP.2008.246
M3 - Conference Proceeding
AN - SCOPUS:54049088975
SN - 9780769532783
T3 - Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008
SP - 1332
EP - 1335
BT - Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008
T2 - 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008
Y2 - 15 August 2008 through 17 August 2008
ER -