Abstract
We apply internal perturbation [3] to the matrix-type cryptosystems [C n] and HM constructed in [9]. Using small instances of these variants, we investigate the existence of linearization equations and degree 2 equations that could be used in a XL attack. Our results indicate that these new variants may be suitable for use in practical implementations. We propose a specific instance for practical implementation, and estimate its performance and security.
| Original language | English |
|---|---|
| Pages (from-to) | 595-602 |
| Number of pages | 8 |
| Journal | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
| Volume | 3481 |
| Issue number | II |
| DOIs | |
| Publication status | Published - 2005 |
| Externally published | Yes |
| Event | International Conference on Computational Science and Its Applications - ICCSA 2005 - , Singapore Duration: 9 May 2005 → 12 May 2005 |
Keywords
- Hidden matrix
- Multivariate
- Perturbation
- Public key
- XL attack