Abstract
We apply internal perturbation [3] to the matrix-type cryptosystems [C n] and HM constructed in [9]. Using small instances of these variants, we investigate the existence of linearization equations and degree 2 equations that could be used in a XL attack. Our results indicate that these new variants may be suitable for use in practical implementations. We propose a specific instance for practical implementation, and estimate its performance and security.
Original language | English |
---|---|
Pages (from-to) | 595-602 |
Number of pages | 8 |
Journal | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Volume | 3481 |
Issue number | II |
DOIs | |
Publication status | Published - 2005 |
Externally published | Yes |
Event | International Conference on Computational Science and Its Applications - ICCSA 2005 - , Singapore Duration: 9 May 2005 → 12 May 2005 |
Keywords
- Hidden matrix
- Multivariate
- Perturbation
- Public key
- XL attack