Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13007))

Included in the following conference series:

Abstract

Isomorphism of polynomials with two secrets (IP2S) problem was proposed by Patarin et al. at Eurocrypt 1996 and the problem is to find two secret linear maps filling in the gap between two polynomial maps over a finite field. At PQC 2020, Santoso proposed a problem originated from IP2S, which is called block isomorphism of polynomials with circulant matrices (BIPC) problem. The BIPC problem is obtained by linearizing IP2S and restricting secret linear maps to linear maps represented by circulant matrices. Using the commutativity of products of circulant matrices, Santoso also proposed an ElGamal-like encryption scheme based on the BIPC problem. In this paper, we give a new security analysis on the ElGamal-like encryption scheme. In particular, we introduce a new attack (called linear stack attack) which finds an equivalent key of the ElGamal-like encryption scheme by using the linearity of the BIPC problem. We see that the attack is a polynomial-time algorithm and can break some 128-bit proposed parameters of the ElGamal-like encryption scheme within 10 h on a standard PC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Brazil)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (Brazil)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (Brazil)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The earlier draft of our attack is published as a preprint in IACR Cryptology ePrint Archive [11].

References

  1. Bardet, M., Faugére, J.C., Salvy, B.: Complexity of gröbner basis computation for semi-regular overdetermined sequences over \(\mathbb{F}_2\) with solutions in \(\mathbb{F}_2\). techreport 5049. Institut National de Recherche en Informatique et en Automatique (INRIA) (2003)

    Google Scholar 

  2. Fauzi, P., Hovd, M.N., Raddum, H.: A practical adaptive key recovery attack on the LGM (GSW-like) cryptosystem. In: Cheon, J.H., Tillich, J.-P. (eds.) PQCrypto 2021 2021. LNCS, vol. 12841, pp. 483–498. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-81293-5_25

    Chapter  Google Scholar 

  3. Bouillaguet, C., Faugère, J.C., Fouque, P.A., Perret, L.: Isomorphism of polynomials: New results (2011)

    Google Scholar 

  4. Casanova, A., Faugere, J.-C., Macario-Rat, G., Patarin, J., Perret, L., Ryckeghem, J.: Gemss, technical report, national institute of standards and technology (2019). https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions

  5. Chen, J., Tan, C.H., Li, X.: Practical cryptanalysis of a public key cryptosystem based on the morphism of polynomials problem. Tsinghua Sci. Technol 23(6), 671–679 (2018)

    Article  Google Scholar 

  6. Ding, J., Chen, M.S., Petzoldt, A., Schmidt, D., Yang, B.Y.: Rainbow, technical report, national institute of standards and technology (2020). https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions

  7. Ding, J., Petzoldt, A., Schmidt, D.S.: Multivariate Public Key Cryptosystems. AIS, vol. 80. Springer, New York (2020). https://doi.org/10.1007/978-1-0716-0987-3

    Book  MATH  Google Scholar 

  8. Ding, J., Chen, M.S., Petzoldt, A., Schmidt, D., Yang, B.Y.: Rainbow, technical report, national institute of standards and technology (2019). https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions

  9. Faugère, J.-C., Perret, L.: Polynomial equivalence problems: algorithmic and theoretical aspects. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 30–47. Springer, Heidelberg (2006). https://doi.org/10.1007/11761679_3

    Chapter  Google Scholar 

  10. Hashimoto, Y.: Solving the problem of blockwise isomorphism of polynomials with circulant matrices. IACR Cryptol. ePrint Arch. 2021, 385 (2021)

    Google Scholar 

  11. Ikematsu, Y., Nakamura, S., Santoso, B., Yasuda, T.: Security analysis on an el-gamal-like multivariate encryption scheme based on isomorphism of polynomials. IACR Cryptol. ePrint Arch. 2021, 169 (2021)

    Google Scholar 

  12. National Institute of Standards and Technology. Report on post quantum cryptography. nistir draft 8105 (2019). https://csrc.nist.gov/csrc/media/publications/nistir/8105/final/documents/nistir_8105_draft.pdf

  13. Patarin, J.: Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33–48. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_4

    Chapter  Google Scholar 

  14. Patarin, J., Goubin, L., Courtois, N.: Improved algorithms for isomorphisms of polynomials. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 184–200. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054126

    Chapter  Google Scholar 

  15. Santoso, B.: Reviving identification scheme based on isomorphism of polynomials with two secrets: a refined theoretical and practical analysis. IEICE Trans. 101–A(5), 787–798 (2018)

    Article  Google Scholar 

  16. Santoso, B.: Generalization of isomorphism of polynomials with two secrets and its application to public key encryption. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 340–359. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44223-1_19

    Chapter  Google Scholar 

  17. Santoso, B., Su, C.: Provable secure post-quantum signature scheme based on isomorphism of polynomials in quantum random oracle model. In: Okamoto, T., Yu, Y., Au, M.H., Li, Y. (eds.) ProvSec 2017. LNCS, vol. 10592, pp. 271–284. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68637-0_17

    Chapter  MATH  Google Scholar 

  18. Samardjiska, S., Chen, M.S., Hulsing, A., Rijneveld, J., Schwabe, P.: Mqdss, technical report, national institute of standards and technology (2019). https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions

  19. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

    Article  MathSciNet  Google Scholar 

  20. Suzuki, K., Tonien, D., Kurosawa, K., Toyota, K.: Birthday paradox for multi-collisions. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 29–40. Springer, Heidelberg (2006). https://doi.org/10.1007/11927587_5

    Chapter  Google Scholar 

  21. Wang, H., Zhang, H., Mao, S., Wu, W., Zhang, L.: New public-key cryptosystem based on the morphism of polynomials problem. Tsinghua Sci. Technol 21(3), 302–311 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by JST CREST Grant Number JPMJCR14D6, JSPS KAKENHI Grant Number JP19K20266, JP20K19802, JP20K03741, JP18H01438, and JP18K11292

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yasuhiko Ikematsu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ikematsu, Y., Nakamura, S., Santoso, B., Yasuda, T. (2021). Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials. In: Yu, Y., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2021. Lecture Notes in Computer Science(), vol 13007. Springer, Cham. https://doi.org/10.1007/978-3-030-88323-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-88323-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-88322-5

  • Online ISBN: 978-3-030-88323-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation