Abstract
Isomorphism of polynomials with two secrets (IP2S) problem was proposed by Patarin et al. at Eurocrypt 1996 and the problem is to find two secret linear maps filling in the gap between two polynomial maps over a finite field. At PQC 2020, Santoso proposed a problem originated from IP2S, which is called block isomorphism of polynomials with circulant matrices (BIPC) problem. The BIPC problem is obtained by linearizing IP2S and restricting secret linear maps to linear maps represented by circulant matrices. Using the commutativity of products of circulant matrices, Santoso also proposed an ElGamal-like encryption scheme based on the BIPC problem. In this paper, we give a new security analysis on the ElGamal-like encryption scheme. In particular, we introduce a new attack (called linear stack attack) which finds an equivalent key of the ElGamal-like encryption scheme by using the linearity of the BIPC problem. We see that the attack is a polynomial-time algorithm and can break some 128-bit proposed parameters of the ElGamal-like encryption scheme within 10 h on a standard PC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The earlier draft of our attack is published as a preprint in IACR Cryptology ePrint Archive [11].
References
Bardet, M., Faugére, J.C., Salvy, B.: Complexity of gröbner basis computation for semi-regular overdetermined sequences over \(\mathbb{F}_2\) with solutions in \(\mathbb{F}_2\). techreport 5049. Institut National de Recherche en Informatique et en Automatique (INRIA) (2003)
Fauzi, P., Hovd, M.N., Raddum, H.: A practical adaptive key recovery attack on the LGM (GSW-like) cryptosystem. In: Cheon, J.H., Tillich, J.-P. (eds.) PQCrypto 2021 2021. LNCS, vol. 12841, pp. 483–498. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-81293-5_25
Bouillaguet, C., Faugère, J.C., Fouque, P.A., Perret, L.: Isomorphism of polynomials: New results (2011)
Casanova, A., Faugere, J.-C., Macario-Rat, G., Patarin, J., Perret, L., Ryckeghem, J.: Gemss, technical report, national institute of standards and technology (2019). https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions
Chen, J., Tan, C.H., Li, X.: Practical cryptanalysis of a public key cryptosystem based on the morphism of polynomials problem. Tsinghua Sci. Technol 23(6), 671–679 (2018)
Ding, J., Chen, M.S., Petzoldt, A., Schmidt, D., Yang, B.Y.: Rainbow, technical report, national institute of standards and technology (2020). https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions
Ding, J., Petzoldt, A., Schmidt, D.S.: Multivariate Public Key Cryptosystems. AIS, vol. 80. Springer, New York (2020). https://doi.org/10.1007/978-1-0716-0987-3
Ding, J., Chen, M.S., Petzoldt, A., Schmidt, D., Yang, B.Y.: Rainbow, technical report, national institute of standards and technology (2019). https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions
Faugère, J.-C., Perret, L.: Polynomial equivalence problems: algorithmic and theoretical aspects. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 30–47. Springer, Heidelberg (2006). https://doi.org/10.1007/11761679_3
Hashimoto, Y.: Solving the problem of blockwise isomorphism of polynomials with circulant matrices. IACR Cryptol. ePrint Arch. 2021, 385 (2021)
Ikematsu, Y., Nakamura, S., Santoso, B., Yasuda, T.: Security analysis on an el-gamal-like multivariate encryption scheme based on isomorphism of polynomials. IACR Cryptol. ePrint Arch. 2021, 169 (2021)
National Institute of Standards and Technology. Report on post quantum cryptography. nistir draft 8105 (2019). https://csrc.nist.gov/csrc/media/publications/nistir/8105/final/documents/nistir_8105_draft.pdf
Patarin, J.: Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33–48. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_4
Patarin, J., Goubin, L., Courtois, N.: Improved algorithms for isomorphisms of polynomials. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 184–200. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054126
Santoso, B.: Reviving identification scheme based on isomorphism of polynomials with two secrets: a refined theoretical and practical analysis. IEICE Trans. 101–A(5), 787–798 (2018)
Santoso, B.: Generalization of isomorphism of polynomials with two secrets and its application to public key encryption. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 340–359. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44223-1_19
Santoso, B., Su, C.: Provable secure post-quantum signature scheme based on isomorphism of polynomials in quantum random oracle model. In: Okamoto, T., Yu, Y., Au, M.H., Li, Y. (eds.) ProvSec 2017. LNCS, vol. 10592, pp. 271–284. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68637-0_17
Samardjiska, S., Chen, M.S., Hulsing, A., Rijneveld, J., Schwabe, P.: Mqdss, technical report, national institute of standards and technology (2019). https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Suzuki, K., Tonien, D., Kurosawa, K., Toyota, K.: Birthday paradox for multi-collisions. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 29–40. Springer, Heidelberg (2006). https://doi.org/10.1007/11927587_5
Wang, H., Zhang, H., Mao, S., Wu, W., Zhang, L.: New public-key cryptosystem based on the morphism of polynomials problem. Tsinghua Sci. Technol 21(3), 302–311 (2016)
Acknowledgements
This work was supported by JST CREST Grant Number JPMJCR14D6, JSPS KAKENHI Grant Number JP19K20266, JP20K19802, JP20K03741, JP18H01438, and JP18K11292
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Ikematsu, Y., Nakamura, S., Santoso, B., Yasuda, T. (2021). Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials. In: Yu, Y., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2021. Lecture Notes in Computer Science(), vol 13007. Springer, Cham. https://doi.org/10.1007/978-3-030-88323-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-88323-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-88322-5
Online ISBN: 978-3-030-88323-2
eBook Packages: Computer ScienceComputer Science (R0)