TY - GEN
T1 - Practical algebraic cryptanalysis for dragon-based cryptosystems
AU - Buchmann, Johannes
AU - Bulygin, Stanislav
AU - Ding, Jintai
AU - Mohamed, Wael Said Abd Elmageed
AU - Werner, Fabian
PY - 2010
Y1 - 2010
N2 - Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were proposed as efficient and secure schemes. In particular, the inventors of the two schemes claim that Little Dragon Two and Poly-Dragon resist algebraic cryptanalysis. In this paper, we show that MXL2, an algebraic attack method based on the XL algorithm and Ding's concept of Mutants, is able to break Little Dragon Two with keys of length up to 229 bits and Poly-Dragon with keys of length up to 299. This contradicts the security claim for the proposed schemes and demonstrates the strength of MXL2 and the Mutant concept. This strength is further supported by experiments that show that in attacks on both schemes the MXL2 algorithm outperforms the Magma's implementation of F4.
AB - Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were proposed as efficient and secure schemes. In particular, the inventors of the two schemes claim that Little Dragon Two and Poly-Dragon resist algebraic cryptanalysis. In this paper, we show that MXL2, an algebraic attack method based on the XL algorithm and Ding's concept of Mutants, is able to break Little Dragon Two with keys of length up to 229 bits and Poly-Dragon with keys of length up to 299. This contradicts the security claim for the proposed schemes and demonstrates the strength of MXL2 and the Mutant concept. This strength is further supported by experiments that show that in attacks on both schemes the MXL2 algorithm outperforms the Magma's implementation of F4.
UR - http://www.scopus.com/inward/record.url?scp=78651084285&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-17619-7_11
DO - 10.1007/978-3-642-17619-7_11
M3 - Conference Proceeding
AN - SCOPUS:78651084285
SN - 3642176186
SN - 9783642176180
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 140
EP - 155
BT - Cryptology and Network Security - 9th International Conference, CANS 2010, Proceedings
T2 - 9th International Conference on Cryptology and Network Security, CANS 2010
Y2 - 12 December 2010 through 14 December 2010
ER -