Paper 2004/103
Cryptanalysis of SFlash v3
Jintai Ding and Dieter Schmidt
Abstract
Sflash is a fast multivariate signature scheme. Though the first version Sflash-v1 was flawed, a second version, Sflash-v2 was selected by the Nessie Consortium and was recommended for implementation of low-end smart cards. Very recently, due to the security concern, the designer of Sflash recommended that Sflash-v2 should not be used, instead a new version Sflash-v3 is proposed, which essentially only increases the length of the signature. The Sflash family of signature schemes is a variant of the Matsumoto and Imai public key cryptosystem. The modification is through the Minus method, namely given a set of polynomial equations, one takes out a few of them to make them much more difficult to solve. In this paper, we attack the Sflash-v3 scheme by combining an idea from the relinearization method by Kipnis and Shamir, which was used to attack the Hidden Field Equation schemes, and the linearization method by Patarin. We show that the attack complexity is less than 2^80, the security standard required by the Nessie Consortium.
Metadata
- Available format(s)
- PDF PS
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- smart cards
- Contact author(s)
- jintai ding @ uc edu
- History
- 2004-05-07: received
- Short URL
- https://ia.cr/2004/103
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2004/103, author = {Jintai Ding and Dieter Schmidt}, title = {Cryptanalysis of {SFlash} v3}, howpublished = {Cryptology {ePrint} Archive, Paper 2004/103}, year = {2004}, url = {https://eprint.iacr.org/2004/103} }