Cryptanalysis of an Implementation of TTM Cryptosystems Based on Q2k -module
- DOI
- 10.2991/icacsei.2013.5How to use a DOI?
- Keywords
- multivariate public key cryptosystems, TTM, high order linearization equations.
- Abstract
TTM cryptosystems proposed by T.Moh are very fast due to the properties of tame automorphisms and small finite fields. The success of the first implementation of this system relies on the construction of Q8-module. Unfortunately, Jintai Ding and Timonthy Hodges have defeated it by decomposing function Q8 into terms S, T1, T2. Later Chunyen Chou, D. J. Guan and Jiunming Chen gave a systematic way to construct Q2k-module. In this paper, we describe an implementation of TTM cryptosystems based on this Q2k-module, then with method similar to Ding-Hodges, we break this implementation. For any given ciphertext, we can derive the corresponding plaintext within O((n+r)6) F2m-operations, where n+r is the number of ciphertext variables.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Hong wei Tao PY - 2013/08 DA - 2013/08 TI - Cryptanalysis of an Implementation of TTM Cryptosystems Based on Q2k -module BT - Proceedings of the 2013 International Conference on Advanced Computer Science and Electronics Information (ICACSEI 2013) PB - Atlantis Press SP - 14 EP - 18 SN - 1951-6851 UR - https://doi.org/10.2991/icacsei.2013.5 DO - 10.2991/icacsei.2013.5 ID - Tao2013/08 ER -