Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Daniel C. Smith-Tone;|
|Title:||The TriTon Transformation|
|Published:||August 27, 2012|
|Abstract:||Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have been formed by attempting to hide the hidden structure of equations have been broken by observing symmetric properties of the differential of the public key, the dichotomy between the roles of the different types of variables, or even the different types of monomials in the systems, have given rise to differential invariant attacks which distinguish between subspaces corresponding to one type of variable or the other. In this monologue, we take a general approach, and describe a basic construction, TriTon, of which several of the above types of systems are special cases. We analyse this system, and conclude that such constructions are weak with naive choices of parameters.|
|Conference:||Third Workshop on Mathematical Cryptology (WMC 2012)|
|Proceedings:||Extended abstracts of the Third Workshop on Mathematical Cryptology (WMC 2012) and the Third International Conference on Symbolic Computation and Cryptography (SCC 2012)|
|Pages:||pp. 71 - 78|
|Location:||Castro Urdiales, -1|
|Dates:||July 9-11, 2012|
|Keywords:||multivariate public key cryptography, differential invariant|
|PDF version:||Click here to retrieve PDF version of paper (107KB)|