Nothing Special   »   [go: up one dir, main page]

Skip to main content

Key Recovery Attack for All Parameters of HFE-

  • Conference paper
  • First Online:
Post-Quantum Cryptography (PQCrypto 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10346))

Included in the following conference series:

Abstract

Recently, by an interesting confluence, multivariate schemes with the minus modifier have received attention as candidates for multivariate encryption. Among these candidates is the twenty year old HFE\(^-\) scheme originally envisioned as a possible candidate for both encryption and digital signatures, depending on the number of public equations removed.

HFE has received a great deal of attention and a variety of cryptanalyses over the years; however, HFE\(^-\) has escaped these assaults. The direct algebraic attack that broke HFE Challenge I is provably more complex on HFE\(^-\), and even after two decades HFE Challenge II is daunting, though not achieving a security level we may find acceptable today. The minors modeling approach to the Kipnis-Shamir (KS) attack is very efficient for HFE, but fails when the number of equations removed is greater than one. Thus it seems reasonable to use HFE\(^-\) for encryption with two equations removed.

This strategy may not be quite secure, however, as our new approach shows. We derive a new key recovery attack still based on the minors modeling approach that succeeds for all parameters of HFE\(^-\). The attack is polynomial in the degree of the extension, though of higher degree than the original minors modeling KS-attack. As an example, the complexity of key recovery for HFE\(^-(q=31,n=36,D=1922,a=2)\) is \(2^{52}\). Even more convincingly, the complexity of key recovery for HFE Challenge-2, an HFE\(^-(16,36,4352,4)\) scheme, is feasible, costing around \(2^{67}\) operations. Thus, the parameter choices for HFE\(^-\) for both digital signatures and, particularly, for encryption must be re-examined.

The rights of this work are transferred to the extent transferable according to title 17 § 105 U.S.C.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Sci. Stat. Comp. 26, 1484 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  2. Group, C.T.: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process. NIST CSRC (2016). http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-forproposals-nal-dec-2016.pdf

  3. Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: Barstow, D., et al. (eds.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419–453. Springer, Heidelberg (1988). doi:10.1007/3-540-45961-8_39

    Chapter  Google Scholar 

  4. Patarin, J.: Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33–48. Springer, Heidelberg (1996). doi:10.1007/3-540-68339-9_4

    Chapter  Google Scholar 

  5. Tao, C., Diene, A., Tang, S., Ding, J.: Simple matrix scheme for encryption. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 231–242. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38616-9_16

    Chapter  Google Scholar 

  6. Ding, J., Petzoldt, A., Wang, L.: The cubic simple matrix encryption scheme. In: [25], pp. 76–87 (2014)

    Google Scholar 

  7. Porras, J., Baena, J., Ding, J.: ZHFE, A new multivariate public key encryption scheme. In: [25], pp. 229–245 (2014)

    Google Scholar 

  8. Szepieniec, A., Ding, J., Preneel, B.: Extension field cancellation: a new central trapdoor for multivariate quadratic systems. In: [26], pp. 182–196 (2016)

    Google Scholar 

  9. Faugère, J.-C., Joux, A.: Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44–60. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45146-4_3

    Chapter  Google Scholar 

  10. Kipnis, A., Shamir, A.: Cryptanalysis of the HFE public key cryptosystem by relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19–30. Springer, Heidelberg (1999). doi:10.1007/3-540-48405-1_2

    Chapter  Google Scholar 

  11. Bettale, L., Faugère, J., Perret, L.: Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. Des. Codes Crypt. 69, 1–52 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  12. Moody, D., Perlner, R.A., Smith-Tone, D.: An asymptotically optimal structural attack on the ABC multivariate encryption scheme. In: [25], pp. 180–196 (2014)

    Google Scholar 

  13. Moody, D., Perlner, R.A., Smith-Tone, D.: Key recovery attack on the cubic ABC simple matrix multivariate encryption scheme. PQCrypto 2017. LNCS, vol. 10346, pp. 272–288. Springer, Cham (2017)

    Google Scholar 

  14. Perlner, R.A., Smith-Tone, D.: Security analysis and key modification for ZHFE. In: [26], pp. 197–212 (2016)

    Google Scholar 

  15. Perret, L.: Grobner basis techniques in post-quantum cryptography. Presentation - Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, 24–26 February 2016. https://www.youtube.com/watch?v=0q957wj6w2I

  16. Ding, J., Kleinjung, T.: Degree of regularity for HFE-. IACR Cryptology ePrint Archive 2011, p. 570 (2011)

    Google Scholar 

  17. Daniels, T., Smith-Tone, D.: Differential properties of the HFE cryptosystem. In: [25], pp. 59–75 (2014)

    Google Scholar 

  18. Dubois, V., Fouque, P.-A., Shamir, A., Stern, J.: Practical cryptanalysis of SFLASH. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 1–12. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74143-5_1

    Chapter  Google Scholar 

  19. Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: Barstow, D., et al. (eds.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419–453. Springer, Heidelberg (1988). doi:10.1007/3-540-45961-8_39

    Chapter  Google Scholar 

  20. Berlekamp, E.R.: Factoring polynomials over large finite fields. Math. Comput. 24, 713–735 (1970)

    Article  MathSciNet  MATH  Google Scholar 

  21. Faugère, J., Din, M.S.E., Spaenlehauer, P.: Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology. In: Koepf, W., (ed.) Symbolic and Algebraic Computation, International Symposium, ISSAC 2010, Proceedings, Munich, Germany, 25–28 July 2010, pp. 257–264. ACM (2010)

    Google Scholar 

  22. Fröberg, R.: An inequality for Hilbert series of graded algebras. Math. Scand. 56, 117–144 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  23. Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system. I. The user language. J. Symbolic Comput. 24, 235–265 (1997). Computational algebra and number theory, London (1993)

    Article  MathSciNet  MATH  Google Scholar 

  24. Barker, E., Roginsky, A.: Transitions: recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication (2015). http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf

  25. Mosca, M. (ed.): PQCrypto 2014. LNCS, vol. 8772. Springer, Cham (2014). doi:10.1007/978-3-319-11659-4

    MATH  Google Scholar 

  26. Takagi, T. (ed.): PQCrypto 2016. LNCS, vol. 9606. Springer, Cham (2016). doi:10.1007/978-3-319-29360-8

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Smith-Tone .

Editor information

Editors and Affiliations

A Toy Example

A Toy Example

To illustrate the attack, we present a complete key recovery for a small odd prime field instance of HFE\(^-\). We simplify the exposition by considering a homogeneous key.

Let \(q=7\), \(n=8\), \(D=14\) and \(a=2\). We construct the degree n extension \(\mathbb {K}=\mathbb {F}_7[x]/\langle x^8+4x^3+6x^2+2x+3 \rangle \) and let \(b\in \mathbb {K}\) be a fixed root of this irreducible polynomial.

We randomly select \(f:\mathbb {K}\rightarrow \mathbb {K}\) of degree D,

$$ f(x)=b^{4100689}x^{14}+b^{1093971}x^8+b^{5273323}x^2, $$

and two invertible linear transformations T and U:

$$\begin{aligned} T=\begin{bmatrix} 2&1&0&3&5&0&3&2\\ 6&2&1&3&4&2&5&1\\ 0&2&5&1&3&1&4&3\\ 3&2&6&4&5&3&4&4\\ 6&4&2&1&0&5&0&0\\ 0&3&3&6&5&1&1&3\\ 0&3&0&4&3&6&1&5\\ 4&3&2&6&1&1&6&3\\\end{bmatrix},\text { and }U=\begin{bmatrix} 5&1&4&1&4&2&5&3\\ 0&6&1&5&3&5&3&2\\ 3&3&5&0&3&4&2&2\\ 4&0&5&4&0&6&4&1\\ 2&6&4&0&0&5&3&5\\ 0&2&4&0&2&0&6&5\\ 4&3&0&3&3&2&2&6\\ 6&2&5&3&5&4&0&0\\\end{bmatrix}.\\ \end{aligned}$$

Since \(b^{1093971}/2=b^{4937171}\), we have

$$ \mathbf {F}=\begin{bmatrix} b^{5273323}&b^{4937171}&0&0&0&0&0&0\\ b^{4937171}&b^{4100689}&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ \end{bmatrix}. $$

We fix \(\varPi :\mathbb {F}_q^8\rightarrow \mathbb {F}_q^6\), the projection onto the first 6 coordinates. Then the public key \(P=\varPi \circ T\circ F\circ U\) in matrix form over \(\mathbb {F}_q\) is given by:

$$\begin{aligned} \mathbf {P_0}=\begin{bmatrix} 5&6&3&6&6&0&4&2\\ 6&0&1&3&3&5&2&1\\ 3&1&4&0&6&0&4&4\\ 6&3&0&3&0&2&3&1\\ 6&3&6&0&4&2&2&4\\ 0&5&0&2&2&2&5&1\\ 4&2&4&3&2&5&1&5\\ 2&1&4&1&4&1&5&2\\\end{bmatrix},\mathbf {P_1}=\begin{bmatrix} 1&6&1&5&4&2&2&2\\ 6&5&4&4&0&1&6&2\\ 1&4&3&5&6&2&1&1\\ 5&4&5&2&2&3&1&5\\ 4&0&6&2&2&1&2&4\\ 2&1&2&3&1&6&2&6\\ 2&6&1&1&2&2&5&6\\ 2&2&1&5&4&6&6&2\\\end{bmatrix},\mathbf {P_2}=\begin{bmatrix} 2&5&2&2&2&3&3&2\\ 5&1&2&1&3&2&5&4\\ 2&2&2&1&6&2&1&0\\ 2&1&1&4&4&5&2&3\\ 2&3&6&4&4&5&2&2\\ 3&2&2&5&5&3&4&6\\ 3&5&1&2&2&4&5&5\\ 2&4&0&3&2&6&5&2\\\end{bmatrix},\\ \mathbf {P_3}=\begin{bmatrix} 1&6&6&4&0&0&3&4\\ 6&2&5&5&4&5&5&6\\ 6&5&4&6&3&6&4&2\\ 4&5&6&4&5&2&4&5\\ 0&4&3&5&6&3&6&0\\ 0&5&6&2&3&2&4&1\\ 3&5&4&4&6&4&4&4\\ 4&6&2&5&0&1&4&0\\\end{bmatrix},\mathbf {P_4}=\begin{bmatrix} 4&4&5&2&6&6&5&2\\ 4&4&0&0&3&4&1&6\\ 5&0&5&3&3&0&1&0\\ 2&0&3&4&1&3&3&2\\ 6&3&3&1&6&5&0&1\\ 6&4&0&3&5&4&6&0\\ 5&1&1&3&0&6&2&6\\ 2&6&0&2&1&0&6&4\\\end{bmatrix},\mathbf {P_5}=\begin{bmatrix} 0&2&6&1&6&2&3&4\\ 2&4&2&0&3&1&5&0\\ 6&2&5&1&4&3&1&1\\ 1&0&1&5&0&0&3&0\\ 6&3&4&0&1&4&1&4\\ 2&1&3&0&4&5&5&5\\ 3&5&1&3&1&5&1&2\\ 4&0&1&0&4&5&2&6\\\end{bmatrix} \end{aligned}$$

1.1 A.1 Recovering a Related HFE Key

This step in key recovery is a slight adaptation of the program of [11]. First, we recover the related private key of Theorem 2. To do this, we solve the MinRank instance on the above \(6=n-2\) \(n\times n\) matrices with target rank \(\lceil log_q(D)\rceil +a=2+2=4\). We may fix one variable to make the ideal generated by the \(5\times 5\) minors zero-dimensional. There are \(n=8\) solutions, each of which consists of the Frobenius powers of the coordinates of

$$ v=(1,b^{5656746},b^{3011516},b^{3024303},b^{1178564},b^{1443785}). $$

The combination \(L=\sum _{i=0}^5v_i\mathbf {P_i}\) is now a rank 4 matrix with entries in \(\mathbb {K}\).

We next form \(\widehat{v}\) from v by appending \(a=2\) random nonzero values from \(\mathbb {K}\) to v. Now we compute

$$ \phi ^{-1}T'^{-1}\circ \phi =\sum _{i=0}^8\widehat{v}_ix^{q^i}. $$

Next we let \(K_i\) be the left kernel matrix of the \(n-i\)th Frobenius power of L for \(i=0,1,\ldots ,a+1\). We then recover a vector w simultaneously in the right kernel of \(K_i\) for all i. For this example, each such element is a multiple in \(\mathbb {K}\) of

$$ w=(b^{4849804},b^{3264357},b^{4466027},b^{638698},b^{2449742},b^{4337472},b^{2752502},b^{1186132}). $$

Then we may compute

$$ \phi ^{-1}\circ U\circ \phi =\sum _{i=0}^8w_ix^{q^i}. $$

At this point we can recover \(\phi ^{-1}\circ f'\circ \phi =T'^{-1}\circ P\circ U'^{-1}\), and have a full private key for the related instance HFE(7, 8, 686). The transformations \(T'\) and \(U'\) and the matrix representation of \(f'\) as a quadratic form over \(\mathbb {K}\) are given by

$$\begin{aligned}&T'=\begin{bmatrix} 1&4&4&5&4&5&5&2\\ 0&6&6&0&4&4&5&5\\ 0&5&0&4&2&0&0&3\\ 0&4&4&2&5&6&6&6\\ 0&3&6&2&5&6&0&0\\ 0&2&0&4&4&6&2&2\\ 0&1&5&5&0&5&2&6\\ 0&3&3&3&6&5&2&2\\ \end{bmatrix}, U'=\begin{bmatrix} 6&2&1&4&4&4&1&6\\ 1&6&0&2&3&0&4&2\\ 2&5&3&6&3&3&0&4\\ 0&5&6&5&4&1&4&2\\ 6&5&3&5&4&6&3&2\\ 0&4&6&1&4&0&1&5\\ 6&0&2&3&6&5&6&3\\ 5&2&0&4&1&2&4&5\\ \end{bmatrix}\\&\mathbf {F'}=\begin{bmatrix} b^{416522}&b^{5402526}&0&0&0&0&0&0\\ b^{5402426}&b^{3093518}&b^{5177024}&0&0&0&0&0\\ 0&b^{5177024}&b^{5689467}&b^{5706144}&0&0&0&0\\ 0&0&b^{5706144}&b^{3464750}&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ \end{bmatrix}. \end{aligned}$$

1.2 A.2 Recovery of Equivalent HFE\(^-\) Key

Now we describe the full key recovery given the related HFE key. We know that there exists a degree \(D=14\) map \(f''(x)=f''_{0,0}x^2+2f''_{0,1}x^8+f''_{1,1}x^{14}\) with associated quadratic form

$$ \mathbf {F''}=\begin{bmatrix} f''_{0,0}&f''_{0,1}&0&0&0&0&0&0\\ f''_{0,1}&f''_{1,1}&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ \end{bmatrix}, $$

and a polynomial \(\pi (x)=x+p_1x^7+p_2x^{49}\) such that \(f'=\pi \circ f''\). Thus we obtain the bilinear system of equations by equating \(\mathbf {F'}\) to:

$$ \widehat{\pi \mathbf {F''}}=\begin{bmatrix} f''_{0,0}&f''_{0,1}&0&0&0&0&0&0\\ f''_{0,1}&f''_{1,1}+p_1(f''_{0,0})^7&p_1(f''_{0,1})^7&0&0&0&0&0\\ 0&p_1(f''_{0,1})^7&p_1(f''_{1,1})^7+p_2(f''_{0,0})^{49}&p_2(f''_{0,1})^{49}&0&0&0&0\\ 0&0&p_2(f''_{0,1})^{49}&p_2(f''_{1,1})^{49}&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ \end{bmatrix}. $$

We clearly have the values of \(f''_{0,0}\) and \(f''_{0,1}\). Then the equations on the highest diagonal are linear in \(p_i\). We obtain \(\pi =x+b^{1948142}x^7+b^{398370}x^{49}\) and continue to solve the now linear system to recover \(f''(x)=b^{416522}x^2+b^{1559326}x^8+b^{1121420}x^{14}\).

We then obtain the matrix form of \(\pi \) over \(\mathbb {F}_q\) and compose with \(T'\):

$$\begin{aligned} \widehat{\pi }=\begin{bmatrix}2&6&6&0&2&2&5&5\\ 6&3&5&3&1&4&5&0\\ 5&2&6&0&6&6&6&1\\ 1&1&3&6&4&1&1&6\\ 5&6&2&4&6&6&1&6\\ 5&3&1&5&0&1&0&4\\ 3&2&1&3&3&1&3&5\\ 4&2&1&1&1&4&4&2\\\end{bmatrix}, T'\circ \widehat{\pi }=\begin{bmatrix} 0&0&1&2&0&5&4&0\\ 1&2&4&4&2&1&0&4\\ 0&2&2&1&1&6&1&0\\ 3&3&1&0&6&3&2&0\\ 0&1&3&1&0&2&2&2\\ 3&4&5&0&1&3&4&2\\ 0&0&0&0&0&0&0&0\\ 0&0&0&0&0&0&0&0\\ \end{bmatrix}. \end{aligned}$$

Replacing the last two rows of \(T'\circ \widehat{\pi }\) to make a full rank matrix produces \(T''\). Then the original public key P is equal to \(\varPi \circ T''\circ \phi ^{-1}\circ f''\circ \phi \circ U'\).

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG (outside the US)

About this paper

Cite this paper

Vates, J., Smith-Tone, D. (2017). Key Recovery Attack for All Parameters of HFE-. In: Lange, T., Takagi, T. (eds) Post-Quantum Cryptography . PQCrypto 2017. Lecture Notes in Computer Science(), vol 10346. Springer, Cham. https://doi.org/10.1007/978-3-319-59879-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59879-6_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59878-9

  • Online ISBN: 978-3-319-59879-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics