Algebraic Attack on HFE Revisited

Jintai Ding University of Cincinnati Dieter Schmidt University of Cincinnati Fabian Werner Technical University of Darmstadt

TBD mathscidoc:2207.43035

ISC 2008, 215–227, 2008.9
In this paper, we study how the algebraic attack on the HFE multivariate public key cryptosystem works if we build an HFE cryptosystem on a finite field whose characteristic is not two. Using some very basic algebraic geometry we argue that when the characteristic is not two the algebraic attack should not be polynomial in the range of the parameters which are used in practical applications. We further support our claims with extensive experiments using the Magma implementation of F_4, which is currently the best publicly available implementation of the Gröbner basis algorithm. We present a new variant of the HFE cryptosystems, where we project the public key of HFE to a space of one dimension lower. This protects the system from the Kipnis-Shamir attack and makes the decryption process avoid multiple candidates for the plaintext. We propose an example for a practical application on GF(11) and suggest a test challenge on GF(7).
No keywords uploaded!
[ Download ] [ 2022-07-12 10:05:44 uploaded by dingjt ] [ 374 downloads ] [ 0 comments ]
@inproceedings{jintai2008algebraic,
  title={Algebraic Attack on HFE Revisited},
  author={Jintai Ding, Dieter Schmidt, and Fabian Werner},
  url={http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220712100544989080612},
  booktitle={ISC 2008},
  pages={215–227},
  year={2008},
}
Jintai Ding, Dieter Schmidt, and Fabian Werner. Algebraic Attack on HFE Revisited. 2008. In ISC 2008. pp.215–227. http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220712100544989080612.
Please log in for comment!
 
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved