Attacking a polynomial-based cryptosystem: Polly Cracker

作者: Rainer Steinwandt , Willi Geiselmann , Regine Endsuleit

DOI: 10.1007/S10207-002-0012-2

关键词:

摘要: We describe several attacks on Polly Cracker, a public key cryptosystem proposed by Fellows and Koblitz. The first kind of attack shows that variations in the CPU time needed for evaluating polynomials can leak significant information about secret key. This might also be interest when dealing with other cryptosystems using polynomial evaluations, like Patarin’s hidden fields equations.

参考文章(13)
Feng Bao, Robert H. Deng, Willi Geiselmann, Claus Schnorr, Rainer Steinwandt, Hongjun Wu, Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems public key cryptography. ,vol. 1992, pp. 153- 164 ,(2001) , 10.1007/3-540-44586-2_11
William D. Banks, Daniel Lieman, Igor E. Shparlinski, An Identification Scheme Based on Sparse Polynomials public key cryptography. pp. 68- 74 ,(2000) , 10.1007/978-3-540-46588-1_6
William D. Banks, Daniel Lieman, Igor E. Shparlinski, Thuong Van To, Cryptographic Applications of Sparse Polynomials over Finite Rings international conference on information security and cryptology. pp. 206- 220 ,(2000) , 10.1007/3-540-45247-8_17
Rainer Steinwandt, Willi Geiselmann, Thomas Beth, A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH international conference on information security. pp. 280- 293 ,(2001) , 10.1007/3-540-45439-X_19
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
D. Grant, K. Krastev, D. Lieman, I. Shparlinski, A Public Key Cryptosystem Based on Sparse Polynomials International Conference on Coding Theory, Cryptography and Related Areas. pp. 114- 121 ,(2000) , 10.1007/978-3-642-57189-3_10
Jacques Patarin, Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms theory and application of cryptographic techniques. pp. 33- 48 ,(1996) , 10.1007/3-540-68339-9_4
WIEB BOSMA, JOHN CANNON, CATHERINE PLAYOUST, The MAGMA algebra system I: the user language Journal of Symbolic Computation. ,vol. 24, pp. 235- 265 ,(1997) , 10.1006/JSCO.1996.0125
Noga Alon, Nabil Kahale, A Spectral Technique for Coloring Random 3-Colorable Graphs SIAM Journal on Computing. ,vol. 26, pp. 1733- 1748 ,(1997) , 10.1137/S0097539794270248
Yi-Hong Wu, Alfred J. Menezes, Robert J. Zuccherato, Neal Koblitz, Algebraic Aspects of Cryptography ,(1998)