Cryptanalysis of the TRMC-4 public key cryptosystem

Xuyun Nie*, Lei Hu, Jintai Ding, Jianyu Li, John Wagner

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

1 Citation (Scopus)

Abstract

In 2006, the inventors of TRMC public key cryptosystem proposed a new variant of TRMC, TRMC-4, which can resist the existing attack, in particular, the Joux et al attack. In this paper, we show that the new version is vulnerable to attack via the linearization equations (LE) method. For any given valid ciphertext and its corresponding TRMC-4 public key, we can derive the corresponding plaintext within 224 double-struck F sign 28-operations, after performing once for the public key a computation of complexity less than 234. Our results are confirmed by computer experiments.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings
PublisherSpringer Verlag
Pages104-115
Number of pages12
ISBN (Print)9783540727378
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event5th International Conference on Applied Cryptography and Network Security, ACNS 2007 - Zhuhai, China
Duration: 5 Jun 20078 Jun 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4521 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Applied Cryptography and Network Security, ACNS 2007
Country/TerritoryChina
CityZhuhai
Period5/06/078/06/07

Keywords

  • Algebraic cryptanalysis
  • Linearization equation
  • Multivariate public key cryptosystem
  • Quadratic polynomial
  • TRMC

Fingerprint

Dive into the research topics of 'Cryptanalysis of the TRMC-4 public key cryptosystem'. Together they form a unique fingerprint.

Cite this