Practical algebraic cryptanalysis for dragon-based cryptosystems

Johannes Buchmann*, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

2 Citations (Scopus)

Abstract

Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were proposed as efficient and secure schemes. In particular, the inventors of the two schemes claim that Little Dragon Two and Poly-Dragon resist algebraic cryptanalysis. In this paper, we show that MXL2, an algebraic attack method based on the XL algorithm and Ding's concept of Mutants, is able to break Little Dragon Two with keys of length up to 229 bits and Poly-Dragon with keys of length up to 299. This contradicts the security claim for the proposed schemes and demonstrates the strength of MXL2 and the Mutant concept. This strength is further supported by experiments that show that in attacks on both schemes the MXL2 algorithm outperforms the Magma's implementation of F4.

Original languageEnglish
Title of host publicationCryptology and Network Security - 9th International Conference, CANS 2010, Proceedings
Pages140-155
Number of pages16
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event9th International Conference on Cryptology and Network Security, CANS 2010 - Kuala Lumpur, Malaysia
Duration: 12 Dec 201014 Dec 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6467 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Cryptology and Network Security, CANS 2010
Country/TerritoryMalaysia
CityKuala Lumpur
Period12/12/1014/12/10

Fingerprint

Dive into the research topics of 'Practical algebraic cryptanalysis for dragon-based cryptosystems'. Together they form a unique fingerprint.

Cite this