Security Analysis via Algebraic Attack Against “A New Encryption Scheme for Multivariate Quadratic System”

  • Conference paper
  • First Online:
Proceedings of the Seventh International Conference on Mathematics and Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1412))

Abstract

A Gröbner basis algorithm computes a good basis for an ideal of a polynomial ring and appears in various situations of cryptography. In particular, it has been used in the security analysis of multivariate public key cryptography (MPKC), and has been studied for a long time; however, it is far from a complete understanding. We consider the algebraic attack using a Gröbner basis algorithm for a new multivariate encryption scheme proposed by Jiahui Chen et al. at Theoretical Computer Science 2020. Their idea to construct a new scheme was to use the minus and plus modifiers to prevent known attacks, such as linearization attacks. Moreover, they discussed having a resistance to the algebraic attack using a Gröbner basis algorithm. However, in our experiments, the algebraic attack breaks their claimed 80- and 128-bit security parameters in reasonable times. It is necessary to understand whether their scheme can avoid such an attack by introducing a slight modification. In this paper, we theoretically describe why the algebraic attack breaks their scheme and give a precise complexity of the algebraic attack. As a result, we demonstrate that the algebraic attack can break the claimed 80- and 128-bit security parameters in the complexities of approximately 25 and 32 bits, respectively. Moreover, based on our complexity estimation of the algebraic attack, we conclude that the Chen et al. scheme is not practical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bardet B, Faugère JC, Salvy B, Yang BY (2005) Asymptotic behavior of the index of regularity of quadratic semi-regular polynomial systems. In: 8th international symposium on effective methods in algebraic geometry (MEGA), pp 1–14

    Google Scholar 

  2. Bernstein DJ, Buchmann J, Dahmen E (eds) Post-quantum cryptography. Springer

    Google Scholar 

  3. Bettale L, Faugère JC, Perret L (2013) Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. Des Codes Cryptogr 69:1–52

    Article  MathSciNet  Google Scholar 

  4. Beullens W, Preneel B, Szepieniec A, Vercauteren F (2020) LUOV, Technical report, National Institute of Standards and Technology, Post-quantum cryptography, https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-2-submissions Accessed 2020-5-10

  5. Bosma W, Cannon J, Playoust C (1997) The Magma algebra system. I. The user language. J. Symbolic Comput 24:235–265

    Google Scholar 

  6. Casanova A, Faugére JC, Macario-Rat G, Patarin J, Perret L, Ryckeghem J (2020) GeMSS, Technical report, National Institute of Standards and Technology, Post-quantum cryptography. https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-2-submissions. Accessed 2020-5-10

  7. Chen J, Ling J, Ning J, Lau TSC, Wang Y (2020) A new encryption scheme for multivariate quadratic systems. Theor Comput Sci 809:372–383

    Article  MathSciNet  Google Scholar 

  8. Cartor R, Smith-Tone D (2018) EFLASH: a new multivariate encryption scheme. In: SAC 2018, LNCS, vol 11349. Springer, pp 281–299

    Google Scholar 

  9. Ding J, Gower JE Schmidt DS (2006) Multivariate public key cryptosystems. Springer

    Google Scholar 

  10. Ding J, Schmidt DS (2005) Rainbow, a new multivariate polynomial signature scheme. In: ACNS 2005, LNCS, vol 3531. Springer, pp 164–175

    Google Scholar 

  11. Ding J, Chen MS, Petzoldt A, Schmidt DS, Yang BY (2020) Rainbow, Technical report, National Institute of Standards and Technology, Post-quantum cryptography. https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-2-submissions. Accessed 2020-5-10

  12. Faugère JC (1999) A new efficient algorithm for computing Gröbner bases (F4). J Pure Appl Algebra 139:61–88

    Article  MathSciNet  Google Scholar 

  13. Faugère JC (2002) A new efficient algorithm for computing Gröbner Bases without reduction to zero (F5). ISSAC 2002:75–83

    MATH  Google Scholar 

  14. Faugère JC, Joux A (2003) Algebraic cryptanalysis of hidden field equations (HFE) using Groöbner bases. In: Crypto 2003, LNCS, vol 2729. Springer, pp 44–60

    Google Scholar 

  15. Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. W.H Freeman, Company

    Google Scholar 

  16. Ikematsu Y, Perlner R, Smith-Tone D, Takagi T, Vates J (2018) HFERP - a new multivariate encryption scheme. In: PQCrypto 2018, LNCS, vol 10786. Springer, pp 396–416

    Google Scholar 

  17. Kipnis A, Patarin L, Goubin L (1999) Unbalanced oil and vinegar schemes. In: EUROCRYPT 1999, LNCS, vol 1592. Springer, pp 206–222

    Google Scholar 

  18. Matsumoto T, Imai H (1988) Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: EUROCRYPT 1988, LNCS, vol 330. Springer, pp 419–453

    Google Scholar 

  19. National Institute of Standards and Technology (2020) Post-quantum cryptography, Round 2 submission. https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-2-Submissions. Accessed 2020-5-10

  20. Patarin J (1995) Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 88. In:CRYPTO 1995, LNCS, vol 963, Springer, pp 248–261

    Google Scholar 

  21. Patarin J (1996) Hidden field equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: EUROCRYPT, LNCS, vol 1070. Springer, pp 33–48 (1996)

    Google Scholar 

  22. Patarin J, Courtois NT, Goubin L (2001) QUARTZ, 128-bit long digital signatures. In: CT-RSA 2001, LNCS, vol 2020. Springer, pp 282–297

    Google Scholar 

  23. Petzoldt A, Chen MS, Yang BY, Tao C, Ding J (2015) Design principles for HFEv- based signature schemes. In: ASIACRYPT 2015, LNCS, vol 9452. Springer, pp 311–334

    Google Scholar 

  24. Szepieniec A, Ding J, Preneel B (2016) Extension field cancellation: a new central trapdoor for multivariate quadratic systems. In: PQCrypto 2016, LNCS, vol 9606. Springer, pp 182–196

    Google Scholar 

  25. Tao C, Diene A, Tang S, Ding J (2013) Simple matrix scheme for encryption. In: PQCrypto 2013, LNCS, vol 7932. Springer, pp 231–242

    Google Scholar 

  26. Yang B-Y, Chen J-M (2004) All in the XL family: theory and practice. In: ICISC 2004, LNCS, vol 3506. Springer, pp 67–86

    Google Scholar 

Download references

Acknowledgements

This work was supported by JST CREST Grant Number JPMJCR14D6, JSPS KAKENHI Grant Number JP19K20266, JP20K19802 and 2019 IMI Joint Use Research Program Short-term Joint Research “New Development of Constructing Next-Generation Cryptography via Unified Approaches of Mathematics Theory, Computation and Cryptology”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yasuhiko Ikematsu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ikematsu, Y., Nakamura, S. (2022). Security Analysis via Algebraic Attack Against “A New Encryption Scheme for Multivariate Quadratic System”. In: Giri, D., Raymond Choo, KK., Ponnusamy, S., Meng, W., Akleylek, S., Prasad Maity, S. (eds) Proceedings of the Seventh International Conference on Mathematics and Computing . Advances in Intelligent Systems and Computing, vol 1412. Springer, Singapore. https://doi.org/10.1007/978-981-16-6890-6_2

Download citation

Publish with us

Policies and ethics

Navigation