Breaking instance II of new TTM cryptosystems

Xuyun Nie*, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

TTM (Tame Transformation Method) is a type ofmultivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attacks, in particular, the Nie et al attack. The two instances are claimed to achieve a security of /2109 against Nie et al attack. Through computation, we found that the instance II satisfied First Order Linearization Equations. After finding all linearization equations, we can perform a ciphertext-only attack to break it.

Original languageEnglish
Title of host publicationProceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008
Pages1332-1335
Number of pages4
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008 - Harbin, China
Duration: 15 Aug 200817 Aug 2008

Publication series

NameProceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008

Conference

Conference2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008
Country/TerritoryChina
CityHarbin
Period15/08/0817/08/08

Fingerprint

Dive into the research topics of 'Breaking instance II of new TTM cryptosystems'. Together they form a unique fingerprint.

Cite this