Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publication Citation: The TriTon Transformation

NIST Authors in Bold

Author(s): Daniel C. Smith-Tone;
Title: The TriTon Transformation
Published: August 27, 2012
Abstract: Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have been formed by attempting to hide the hidden structure of equations have been broken by observing symmetric properties of the differential of the public key, the dichotomy between the roles of the different types of variables, or even the different types of monomials in the systems, have given rise to differential invariant attacks which distinguish between subspaces corresponding to one type of variable or the other. In this monologue, we take a general approach, and describe a basic construction, TriTon, of which several of the above types of systems are special cases. We analyse this system, and conclude that such constructions are weak with naive choices of parameters.
Conference: Third Workshop on Mathematical Cryptology (WMC 2012)
Proceedings: Extended abstracts of the Third Workshop on Mathematical Cryptology (WMC 2012) and the Third International Conference on Symbolic Computation and Cryptography (SCC 2012)
Pages: pp. 71 - 78
Location: Castro Urdiales, -1
Dates: July 9-11, 2012
Keywords: multivariate public key cryptography, differential invariant
Research Areas: Math
PDF version: PDF Document Click here to retrieve PDF version of paper (107KB)