New differential-algebraic attacks and reparametrization of rainbow

Jintai Ding*, Bo Yin Yang, Chia Hsin Owen Chen, Ming Shing Chen, Chen Mou Cheng

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

87 Citations (Scopus)

Abstract

A recently proposed class of multivariate Public-Key Cryptosystems, the Rainbow-Like Digital Signature Schemes, in which successive sets of central variables are obtained from previous ones by solving linear equations, seem to lead to efficient schemes (TTS, TRMS, and Rainbow) that perform well on systems of low computational resources. Recently SFLASH (C* -) was broken by Dubois, Fouque, Shamir, and Stern via a differential attack. In this paper, we exhibit similar algebraic and diffential attacks, that will reduce published Rainbow-like schemes below their security levels. We will also discuss how parameters for Rainbow and TTS schemes should be chosen for practical applications.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings
Pages242-257
Number of pages16
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event6th International Conference on Applied Cryptography and Network Security, ACNS 2008 - New York, NY, United States
Duration: 3 Jun 20086 Jun 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5037 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Applied Cryptography and Network Security, ACNS 2008
Country/TerritoryUnited States
CityNew York, NY
Period3/06/086/06/08

Keywords

  • Algebraic attack
  • Differential attack
  • Oil-and-vinegar
  • Rank

Fingerprint

Dive into the research topics of 'New differential-algebraic attacks and reparametrization of rainbow'. Together they form a unique fingerprint.

Cite this