A ciphertext-only attack on Polly Two

Polly Two is a public key encryption scheme that builds on the conceptual public key encryption scheme Polly Cracker. We describe a heuristic attack on Polly Two, which aims at recovering the plaintext from a given ciphertext without revealing the secret key. The attack has been applied successfully to solve the latest “Polly Two challenge”.

[1]  Neal Koblitz,et al.  Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.

[2]  Van-Ly Le,et al.  Polly two - a public key cryptosystem based on Polly cracker , 2003 .

[3]  M. Fellows Combinatorial Cryptosystems Galore! , 2022 .

[4]  Rainer Steinwandt,et al.  Cryptanalysis of Polly Cracker , 2002, IEEE Trans. Inf. Theory.

[5]  Le Van Ly Polly two : a new algebraic polynomial-based Public-Key Scheme , 2022 .

[6]  Dennis Hofheinz,et al.  A "differential" attack on Polly Cracker , 2002, Proceedings IEEE International Symposium on Information Theory,.

[7]  John J. Cannon,et al.  The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..