380 likes | 502 Views
Some new aspects concerning the Analysis of HFE type Cryptosystems. Magnus Daum Patrick Felke. Overview. What is HFE? Some Experimental Results on Attacking HFE with Buchberger Algorithm An improved Algorithm for Separating Branches. What is HFE?. Public Key. Secret Key. Basic HFE.
E N D
Some new aspects concerning the Analysis of HFE type Cryptosystems Magnus Daum Patrick Felke
Overview • What is HFE? • Some Experimental Results on Attacking HFE with Buchberger Algorithm • An improved Algorithm for Separating Branches Some new aspects concerning the Analysis of HFE type Cryptosystems
Public Key Secret Key Basic HFE one-way trapdoor function Trapdoor Some new aspects concerning the Analysis of HFE type Cryptosystems
Basic HFE: Example Some new aspects concerning the Analysis of HFE type Cryptosystems
Basic HFE: Example Some new aspects concerning the Analysis of HFE type Cryptosystems
Basic HFE: Example Encryption Some new aspects concerning the Analysis of HFE type Cryptosystems
Basic HFE: Example Decryption Some new aspects concerning the Analysis of HFE type Cryptosystems
Basic HFE: Example / Signing Verifying Some new aspects concerning the Analysis of HFE type Cryptosystems
Parameters of HFE • n Number of unknowns and equations • q Size of smaller finite field K • d Degree of hidden polynomial Some new aspects concerning the Analysis of HFE type Cryptosystems
Overview • General Approach with Buchberger Algorithm • Why HFE systems are special • Simulations • Perturbations • What is HFE? • Some Experimental Results on Attacking HFE with Buchberger Algorithm • An improved Algorithm for Separating Branches Some new aspects concerning the Analysis of HFE type Cryptosystems
General Approach: Example / Signing Decryption Some new aspects concerning the Analysis of HFE type Cryptosystems
Buchberger Algorithm General Approach: Example Some new aspects concerning the Analysis of HFE type Cryptosystems
degree of output poly-nomials may get very big Buchberger algorithm has exponential worst case complexity compute all solutions in algebraic closure … in general only feasible for very few unknowns General Approach: Problems Some new aspects concerning the Analysis of HFE type Cryptosystems
HFE Systems are Special • defined over a very small finite field • include only quadratic polynomials • need only solutions in the base field Fq • hidden polynomial of low degree Some new aspects concerning the Analysis of HFE type Cryptosystems
solutions we are looking for fulfil Proposition: Solutions in the Base Field Some new aspects concerning the Analysis of HFE type Cryptosystems
Buchberger Algorithm Buchberger Algorithm Solutions in the Base Field • Advantages: • we compute only information we need • degree of polynomials involved in this computation is bounded Some new aspects concerning the Analysis of HFE type Cryptosystems
HFE Systems are Special • defined over a very small finite field • include only quadratic polynomials • need only solutions in the base field Fq • hidden polynomial of low degree Some new aspects concerning the Analysis of HFE type Cryptosystems
Hidden Polynomial • One main idea of Buchberger Algorithm can be described as making use of relations between the input polynomials in a sophisticated way • Attack on C* (Patarin / Dobbertin): • For C*-systems there are many linear relations between the public polynomials. • Courtois: • For general HFE there are also some relations, but they are more complex. • lower degree d more relations Some new aspects concerning the Analysis of HFE type Cryptosystems
HFE Systems are Special • defined over a very small finite field • include only quadratic polynomials • need only solutions in the base field Fq • hidden polynomial of low degree Some new aspects concerning the Analysis of HFE type Cryptosystems
Simulations • about 100.000 simulations in SINGULAR • parameters: mostly • HFE systems and random quadratic systems • in each simulation: • generate system of quadratic equations (HFE or random) • add polynomials • solve by applying Buchberger Algorithm (with FGLM) Some new aspects concerning the Analysis of HFE type Cryptosystems
Simulations: Dependence on n Some new aspects concerning the Analysis of HFE type Cryptosystems
q=3, random log(time) q=3, d=30 q=3, d=12 q=2, random q=2, d=128 q=2, d=20 6,00 8,00 10,00 12,00 14,00 16,00 18,00 20,00 22,00 24,00 26,00 7,00 9,00 11,00 13,00 15,00 17,00 19,00 21,00 23,00 25,00 6,00 8,00 10,00 12,00 14,00 16,00 18,00 20,00 7,00 9,00 11,00 13,00 15,00 17,00 19,00 exponential time complexity !? Simulations: Dependence on n log(time) q=2, C* n Some new aspects concerning the Analysis of HFE type Cryptosystems
time depends on rather than on d Simulations: Dependence on d Some new aspects concerning the Analysis of HFE type Cryptosystems
∙3 ∙3 ∙3 ∙8 ∙7 ∙11 if d is small (approx. ) Solving HFE systems becomes much easier !! if d is large (approx. ) HFE systems behave like systems of random quadratic equations (random systems correspond to dlogqde=n) Simulations: Dependence on dlogqde and usually logq(d)<<n (e.g. HFE Challenge 1: q=2, n=80, d=96 !dlogq(d)e=7 << 40) Some new aspects concerning the Analysis of HFE type Cryptosystems
log(time) 6,00 8,00 10,00 12,00 14,00 16,00 18,00 20,00 22,00 24,00 26,00 7,00 9,00 11,00 13,00 15,00 17,00 19,00 23,00 25,00 21,00 Simulations: Dependence on dlogqde • Usually dlogq(d)e<<n • e.g. HFE Challenge 1: q=2, n=80, d=96dlogq(d)e=7 << 80 ) • Extrapolating the times needed for d=96,solving this challenge seems out of reach • By applying F5/2 now it is possible to solve HFE Challenge 1 in 96 h. • By applying a highly optimized variant of theBuchberger Algorithm in the future it might bepossible to solve certain instances of HFE with very small d in some feasible time. Some new aspects concerning the Analysis of HFE type Cryptosystems
Perturbations Some new aspects concerning the Analysis of HFE type Cryptosystems
Perturbations • Little changes on the multivariate side of the cryptosystem which are used to hide the underlying algebraic structure • e.g. „-“ (i.e. removing polynomials): Public Key Some new aspects concerning the Analysis of HFE type Cryptosystems
Perturbations • Little changes on the multivariate side of the cryptosystem which are used to hide the underlying algebraic structure • e.g. „+“ (i.e. adding some random polynomials): Public Key(after „mixing“ with S and T) Some new aspects concerning the Analysis of HFE type Cryptosystems
Perturbations • Little changes on the multivariate side of the cryptosystem which are used to hide the underlying algebraic structure • Perturbated HFE systems are claimed to be more secure than Basic HFE systems • All proposed HFE systems (e.g. SFLASH, QUARTZ) use perturbations Some new aspects concerning the Analysis of HFE type Cryptosystems
Simulations on Perturbations • Simulations in the case q=2, n=15 • included systems generated • from HFE with d2{ 5,9,17 } • randomly • added / removed / replaced between 0 and 5 polynomials Some new aspects concerning the Analysis of HFE type Cryptosystems
d=5 random 3000,00 4000,00 3000,00 2000,00 time_1 time_1 2000,00 1000,00 1000,00 0,00 5 5 4 4 3 3 minus 5 2 minus 5 4 2 1 3 4 1 2 3 0 1 plus 2 0 0 1 plus 0 Simulations on Perturbations Better consider the ratio of needed times for HFE systems to that for random systems Some new aspects concerning the Analysis of HFE type Cryptosystems
1,00 1,00 1,00 0,80 0,80 0,80 0,60 0,60 0,60 ratio ratio ratio 0,40 0,40 0,40 0,20 0,20 0,20 5 4 3 5 5 minus 5 2 4 4 4 1 3 0 2 0 1 plus 0 3 3 0 minus minus 5 5 2 2 d=5 4 4 1 1 3 3 2 2 d=9 d=17 plus 1 1 plus 0 0 Simulations on Perturbations Better consider the ratio of needed times for HFE systems to that for random systems • adding/removing just some few polynomials makes solving HFE systems significantly more difficult • Perturbated HFE seems to be more secure than Basic HFE Some new aspects concerning the Analysis of HFE type Cryptosystems
Conclusion of this part • Time complexity of solving HFE systems by applying Buchberger Algorithm depends … • nearly exponentially on number n of unknowns • strongly on dlogq(d)e • Security of HFE depends significantly on the degree of the hidden polynomial • Perturbations seem to make HFE more secure Some new aspects concerning the Analysis of HFE type Cryptosystems
Overview • What is HFE? • Some Experimental Results on Attacking HFE with Buchberger Algorithm • An improved Algorithm for Separating Branches Some new aspects concerning the Analysis of HFE type Cryptosystems