## Cryptology ePrint Archive: Report 2003/084

Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem

Jintai Ding, Timonthy Hodges

Abstract: A Tamed Transformation Method (TTM) cryptosystem was proposed by T.T.Moh in 1999. We describe how the first implementation scheme of the TTM system can be defeated. The computational complexity of our attack is $2^{33}$ computations on the finite field with $2^8$ elements.

Category / Keywords: public-key cryptography / Cryptanalysis, TTM