Cryptanalysis of the Bisectional MQ Equations System

The security of many recently proposed cryptosystems is mainly based on the difficulty of solving large multivariate quadratic equations systems. Apart from UOV schemes with proper parameter values, the basic types of these schemes can be broken without great difficulty. Moreover, there are some shortages lying in some of these examined schemes. This paper proposes a bisectional multivariate quadratic equation (BMQE) system over a finite field of degree q (denoted as F_q). The BMQE system is analyzed by Kipnis & Shamir’s relinearization, and it is shown that the number of the variables n, together with the number of the equations m and the number of the degree q of F_q, have a great impact on the complexity of the BMQE system. If they are properly set, relinearization cannot be used to solve this system.

[1]  Hideki Imai,et al.  Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.

[2]  Jacques Patarin Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'98 , 2000, Des. Codes Cryptogr..

[3]  Nicolas Courtois,et al.  Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.

[4]  Jacques Patarin,et al.  Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.

[5]  Louis Goubin,et al.  C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai , 1998, ASIACRYPT.

[6]  Yong Feng,et al.  A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations , 2005, IACR Cryptol. ePrint Arch..

[7]  Jintai Ding,et al.  Inoculating Multivariate Schemes Against Differential Attacks , 2006, Public Key Cryptography.

[8]  Christopher Wolf,et al.  Multivariate quadratic polynomials in public key cryptography , 2005, IACR Cryptol. ePrint Arch..

[9]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.

[10]  Maurice Herlihy,et al.  Axioms for concurrent objects , 1987, POPL '87.

[11]  Jintai Ding,et al.  Cryptanalysis of Rational Multivariate Public Key Cryptosystems , 2008, PQCrypto.

[12]  A. Shamir,et al.  Cryptanalysis of the HFE Public Key Cryptosystem , 1999 .

[13]  Jintai Ding,et al.  Square-Vinegar Signature Scheme , 2008, PQCrypto.

[14]  Robert H. Deng,et al.  Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings , 2005, ISPEC.

[15]  Omessaad Hamdi,et al.  Hidden Field Equations Cryptosystem Performances , 2006, IEEE International Conference on Computer Systems and Applications, 2006..

[16]  Louis Goubin,et al.  Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.

[17]  Adi Shamir,et al.  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.

[18]  Jintai Ding,et al.  Multivariate Public Key Cryptosystems (Advances in Information Security) , 2006 .

[19]  Bart Preneel,et al.  On the security of stepwise triangular systems , 2006, Des. Codes Cryptogr..

[20]  Jacques Stern,et al.  Differential Cryptanalysis for Multivariate Schemes , 2005, EUROCRYPT.

[21]  Jintai Ding,et al.  Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem , 2005, IMACC.

[22]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[23]  Jintai Ding,et al.  Secure Electronic Voting , 2006, Advances in Information Security.