Cryptology ePrint Archive: Report 2004/103
Cryptanalysis of SFlash v3
Jintai Ding and Dieter Schmidt
Abstract: Sflash is a fast multivariate signature scheme. Though the first version Sflash-v1 was flawed, a second version, Sflash-v2 was selected by the Nessie Consortium and was recommended for implementation of low-end smart cards. Very recently, due to the security concern, the designer of Sflash recommended that Sflash-v2 should not be used, instead a new version Sflash-v3 is proposed, which essentially only increases the length of the signature.
The Sflash family of signature schemes is a variant of the Matsumoto and Imai public key cryptosystem. The modification is through the Minus method, namely given a set of polynomial equations, one takes out a few of them to make them much more difficult to solve.
In this paper, we attack the Sflash-v3 scheme by combining an idea from the relinearization method by Kipnis and Shamir, which was used to attack the Hidden Field Equation schemes, and the linearization method by Patarin. We show that the attack complexity is less than 2^80, the security standard required by the Nessie Consortium.
Category / Keywords: public-key cryptography / smart cards
Date: received 3 May 2004
Contact author: jintai ding at uc edu
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20040507:075909 (All versions of this report)
Short URL: ia.cr/2004/103
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]