Paper 2009/567

Properties of the Discrete Differential with Cryptographic Applications

Daniel Smith-Tone

Abstract

Recently, the $C^{*-}$ signature scheme has been completely broken by Dubois et al. (Dubois et al., CRYPTO and EUROCRYPT 2007). As a consequence, the security of SFLASH and other multivariate public key systems have been impaired. The attacks presented in (Dubois et al., CRYPTO and EUROCRYPT 2007) rely on a symmetry of the differential of the encryption mapping. In (Ding et al., 2007), Ding et al. experimentally justify the use projection as a method of avoiding the new attack. In this paper, we derive some properties of the discrete differential, give a theoretical justification for the reparation in (Ding et al., 2007), and establish the exact context in which this attack is applicable.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Matsumoto-Imaimultivariate public key cryptographydiscretedifferentialSFLASHsymmetryHFE
Contact author(s)
smithdc @ indiana edu
History
2009-11-23: received
Short URL
https://ia.cr/2009/567
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/567,
      author = {Daniel Smith-Tone},
      title = {Properties of the Discrete Differential with Cryptographic Applications},
      howpublished = {Cryptology {ePrint} Archive, Paper 2009/567},
      year = {2009},
      url = {https://eprint.iacr.org/2009/567}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.