Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic

被引:67
作者
Bettale, Luk [1 ]
Faugere, Jean-Charles [1 ]
Perret, Ludovic [1 ]
机构
[1] UPMC Univ Paris 06, Paris Rocquencourt Ctr, INRIA,PolSys Project,UMR 7606, CNRS,UFR Ingn 919,UMR 7606,LIP6, F-75252 Paris, France
关键词
Hidden field equations; MinRank; Grobner bases; INVERTING HFE; ALGORITHM; SIGNATURE; SYSTEM; KEYS;
D O I
10.1007/s10623-012-9617-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate in this paper the security of HFE and Multi-HFE schemes as well as their minus and embedding variants. Multi-HFE is a generalization of the well-known HFE schemes. The idea is to use a multivariate quadratic system-instead of a univariate polynomial in HFE-over an extension field as a private key. According to the authors, this should make the classical direct algebraic (message-recovery) attack proposed by FaugSre and Joux on HFE no longer efficient against Multi-HFE. We consider here the hardness of the key-recovery in Multi-HFE and its variants, but also in HFE (both for odd and even characteristic). We first improve and generalize the basic key recovery proposed by Kipnis and Shamir on HFE. To do so, we express this attack as matrix/vector operations. In one hand, this permits to improve the basic Kipnis-Shamir (KS) attack on HFE. On the other hand, this allows to generalize the attack on Multi-HFE. Due to its structure, we prove that a Multi-HFE scheme has much more equivalent keys than a basic HFE. This induces a structural weakness which can be exploited to adapt the KS attack against classical modifiers of multivariate schemes such as minus and embedding. Along the way, we discovered that the KS attack as initially described cannot be applied against HFE in characteristic 2. We have then strongly revised KS in characteristic 2 to make it work. In all cases, the cost of our attacks is related to the complexity of solving MinRank. Thanks to recent complexity results on this problem, we prove that our attack is polynomial in the degree of the extension field for all possible practical settings used in HFE and Multi-HFE. This makes then Multi-HFE less secure than basic HFE for equally-sized keys. As a proof of concept, we have been able to practically break the most conservative proposed parameters of multi-HFE in few days (256 bits security broken in 9 days).
引用
收藏
页码:1 / 52
页数:52
相关论文
共 48 条
  • [1] [Anonymous], 2010, INT S SYMBOLIC ALGEB
  • [2] [Anonymous], 2005, Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra
  • [3] [Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness
  • [4] [Anonymous], 1994, GRADUATE STUDIES MAT
  • [5] Bardet M., 2005, 8 INT S EFF METH ALG, P1
  • [6] Bardet Magali, 2004, P INT C POL SYST SOL, P71
  • [7] Bettale L, 2011, LECT NOTES COMPUT SC, V6571, P441, DOI 10.1007/978-3-642-19379-8_27
  • [8] Hybrid approach for solving multivariate systems over finite fields
    Bettale, Luk
    Faugere, Jean-Charles
    Perret, Ludovic
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2009, 3 (03) : 177 - 197
  • [9] Billet O., 2008, SCC 2008
  • [10] Bogdauov A, 2008, LECT NOTES COMPUT SC, V5154, P45