Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem

Jintai Ding Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45221-0025, USA Timonthy Hodges Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45221-0025, USA

TBD mathscidoc:2207.43100

IACR Cryptol. ePrint Arch., 2003.5
A Tamed Transformation Method (TTM) cryptosystem was proposed by T.T.Moh in 1999. We describe how the first implementation scheme of the TTM system can be defeated. The computational complexity of our attack is 2^{33} computations on the finite field with 2^8 elements.
No keywords uploaded!
[ Download ] [ 2022-07-21 14:10:17 uploaded by dingjt ] [ 11 downloads ] [ 0 comments ]
@inproceedings{jintai2003cryptanalysis,
  title={Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem},
  author={Jintai Ding, and Timonthy Hodges},
  url={http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220721141017980718682},
  booktitle={IACR Cryptol. ePrint Arch.},
  year={2003},
}
Jintai Ding, and Timonthy Hodges. Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem. 2003. In IACR Cryptol. ePrint Arch.. http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220721141017980718682.
Please log in for comment!
 
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved