Skip to main content

Equivalent Keys in HFE, C*, and Variations

  • Conference paper
Progress in Cryptology – Mycrypt 2005 (Mycrypt 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3715))

Included in the following conference series:

Abstract

In this article, we investigate the question of equivalent keys for two \({\mathcal M}\)ultivariate \({\mathcal Q}\)uadratic public key schemes HFE and C* − − and improve over a previously known result, which appeared at PKC 2005. Moreover, we show a new non-trivial extension of these results to the classes HFE-, HFEv, HFEv-, and C* − −, which are cryptographically stronger variants of the original HFE and C* schemes. In particular, we are able to reduce the size of the private — and hence the public — key space by at least one order of magnitude and several orders of magnitude on average. While the results are of independent interest themselves as they broaden our understanding of \({\mathcal M}\)ultivariate \({\mathcal Q}\)uadratic schemes, we also see applications both in cryptanalysis and in memory efficient implementations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Braeken, A., Wolf, C., Preneel, B.: A study of the security of Unbalanced Oil and Vinegar signature schemes. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, 13 pages. Springer, Heidelberg (2005), cf http://eprint.iacr.org/2004/222/

    Google Scholar 

  2. Courtois, N., Goubin, L., Patarin, J.: Quartz: Primitive specification (second revised version) (October 2001), https://www.cosic.esat.kuleuven.ac.be/nessie (Submissions, Quartz, 18 pages)

  3. Courtois, N., Goubin, L., Patarin, J.: SFlashv3, a fast asymmetric signature scheme — Revised Specificatoin of SFlash, version 3.0. ePrint Report 2003/211, 14 pages (October 17, 2003), http://eprint.iacr.org/

  4. Ding, J.: A new variant of the matsumoto-imai cryptosystem through perturbation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 305–318. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Faugère, J.-C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equations (HFE) using gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44–60. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Geiselmann, W., Steinwandt, R., Beth, T.: Attacking the affine parts of SFlash. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 355–359. Springer, Heidelberg (2001), Extended version: http://eprint.iacr.org/2003/220/

    Chapter  Google Scholar 

  7. Kipnis, A., Patarin, J., Goubin, L.: Unbalanced Oil and Vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206–222. Springer, Heidelberg (1999)

    Google Scholar 

  8. Kipnis, A., Shamir, A.: Cryptanalysis of the HFE public key cryptosystem. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19–30. Springer, Heidelberg (1999), http://www.minrank.org/hfesubreg.ps or http://citeseer.nj.nec.com/kipnis99cryptanalysis.html

    Google Scholar 

  9. Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature verification and message-encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419–545. Springer, Heidelberg (1988)

    Google Scholar 

  10. NESSIE: New European Schemes for Signatures, Integrity, and Encryption. Information Society Technologies programme of the European commission (IST-1999-12324), http://www.cryptonessie.org/

  11. Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248–261. Springer, Heidelberg (1995)

    Google Scholar 

  12. Patarin, J.: Asymmetric cryptography with a hidden monomial. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 45–60. Springer, Heidelberg (1996)

    Google Scholar 

  13. Patarin, J.: Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33–48. Springer, Heidelberg (1996), Extended Version: http://www.minrank.org/hfe.pdf

    Google Scholar 

  14. Toli, I.: Cryptanalysis of HFE, June 2003. arXiv preprint server, 7 pages, http://arxiv.org/abs/cs.CR/0305034

  15. Wolf, C.: Efficient public key generation for HFE and variations. In: Dawson, E., Klimm, W. (eds.) Cryptographic Algorithms and Their Uses 2004, QUT University, pp. 78–93 (2004)

    Google Scholar 

  16. Wolf, C., Braeken, A., Preneel, B.: Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 145–151. Springer, Heidelberg (2005), http://eprint.iacr.org/2004/237

    Chapter  Google Scholar 

  17. Wolf, C., Preneel, B.: Asymmetric cryptography: Hidden Field Equations. In: Neittaanmäki, P., Rossi, T., Korotov, S., Oñate, E., Périaux, J., Knörzer, D. (eds.) European Congress on Computational Methods in Applied Sciences and Engineering 2004, Jyväskylä University, 20 pages (2004), extended version: http://eprint.iacr.org/2004/072/

  18. Wolf, C., Preneel, B.: Equivalent keys in HFE, C*, and variations. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, p. 12. Springer, Heidelberg (2005), Extended version http://eprint.iacr.org/2004/360/

    Chapter  Google Scholar 

  19. Wolf, C., Preneel, B.: Superfluous keys in \(\mathcal{M}\)ultivariate \(\mathcal{Q}\)uadratic asymmetric systems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, Springer, Heidelberg (2005), http://eprint.iacr.org/2004/361/

    Chapter  Google Scholar 

  20. Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005/077, 64 pages (May 12, 2005), http://eprint.iacr.org/2005/077/

  21. Yang, B.-Y., Chen, J.-M.: Rank attacks and defence in Tame-like multivariate PKC’s. Cryptology ePrint Archive, Report 2004/061, 21 pages (September 29, 2004), http://eprint.iacr.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wolf, C., Preneel, B. (2005). Equivalent Keys in HFE, C*, and Variations. In: Dawson, E., Vaudenay, S. (eds) Progress in Cryptology – Mycrypt 2005. Mycrypt 2005. Lecture Notes in Computer Science, vol 3715. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554868_4

Download citation

  • DOI: https://doi.org/10.1007/11554868_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28938-8

  • Online ISBN: 978-3-540-32066-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics