High Order Linearization Equation (HOLE) attack on multivariate public key cryptosystems

Jintai Ding*, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

44 Citations (Scopus)

Abstract

In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosystem, is proposed by Wang, Yang, Hu and Lai. We use the second order linearization equation attack method by Patarin to break MFE. Given a ciphertext, we can derive the plaintext within 223 double-struck F sign215 -multiplications, after performing once for any given public key a computation of complexity less than 252. We also propose a high order linearization equation (HOLE) attack on multivariate public key cryptosystems, which is a further generalization of the (first and second order) linearization equation (LE). This method can be used to attack extensions of the current MFE.

Original languageEnglish
Title of host publicationPublic Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings
PublisherSpringer Verlag
Pages233-248
Number of pages16
ISBN (Print)9783540716761
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event10th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2007 - Beijing, China
Duration: 16 Apr 200720 Apr 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4450 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2007
Country/TerritoryChina
CityBeijing
Period16/04/0720/04/07

Keywords

  • Algebraic cryptanalysis
  • High order linearization equation
  • Multivariate public key cryptosystem
  • Quadratic polynomial

Fingerprint

Dive into the research topics of 'High Order Linearization Equation (HOLE) attack on multivariate public key cryptosystems'. Together they form a unique fingerprint.

Cite this