Paper 2007/366

Breaking the Symmetry: a Way to Resist the New Differential Attack

Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, and Vivien Dubois

Abstract

Sflash had recently been broken by Dubois, Stern, Shamir, etc., using a differential attack on the public key. The $C^{\ast-}$ signature schemes are hence no longer practical. In this paper, we will study the new attack from the point view of symmetry, then (1) present a simple concept (projection) to modify several multivariate schemes to resist the new attacks; (2) demonstrate with practical examples that this simple method could work well; and (3) show that the same discussion of attack-and-defence applies to other big-field multivariates. The speed of encryption schemes is not affected, and we can still have a big-field multivariate signatures resisting the new differential attacks with speeds comparable to Sflash.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. multivariate public key cryptography,differential, symmetry, projection
Contact author(s)
ding @ math uc edu
History
2007-09-13: received
Short URL
https://ia.cr/2007/366
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/366,
      author = {Jintai Ding and Bo-Yin Yang and Chen-Mou Cheng and Owen Chen and Vivien Dubois},
      title = {Breaking the Symmetry: a Way to Resist the New Differential Attack},
      howpublished = {Cryptology ePrint Archive, Paper 2007/366},
      year = {2007},
      note = {\url{https://eprint.iacr.org/2007/366}},
      url = {https://eprint.iacr.org/2007/366}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.