Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case
|
|
- Penelope Cain
- 5 years ago
- Views:
Transcription
1 1 / 27 Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case Marta Conde Pena 1 Jean-Charles Faugère 2,3,4 Ludovic Perret 3,2,4 1 Spanish National Research Council (CSIC) 2 Sorbonne Universités, UPMC Univ Paris 06 3 INRIA 4 CNRS
2 Motivation 2 / 27 Contents 1 Motivation 2 Modeling 3 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d Heuristic Randomized Polynomial-time Algorithm for HSP 2 4 Conclusions and Open Problems
3 Motivation 3 / 27 Cash from a Classical vs Quantum Perspective Classical Physics In principle, it is impossible to make money uncopyable. No-cloning Theorem in Quantum Mechanics An unknown quantum state cannot be cloned. Can this be used to make unforgeable cash?
4 Motivation 4 / 27 Quantum Money S. Wiesner. Conjugate Coding. ACM SIGACT News, 15(1):78 88, Wiesner s Idea for Quantum Money A quantum banknote has a serial number and t photons. No Forging Probability of successful forging exponentially small on t.
5 Motivation 5 / 27 A Step Forward: Public-key Quantum Money Ideally, anyone should be able to verify the validity of money. Public-key quantum money. E. Farhi et al. Quantum Money from Knots. ITCS S. Aaronson and P. Christiano. Quantum Money from Hidden Subspaces. STOC Quantum Money Scheme of Aaronson-Christiano Security under a classical (non-quantum) hardness assumption.
6 Motivation 6 / 27 Hardness Assumption Hidden Subspaces Problem (HSP q ) Input : p 1,..., p m, q 1,..., q m F q [x 1,..., x n ] of degree d. d 3. n m 2n. Find : n/2-dimensional subspace A F q n s.t p i (A) = 0 and q i (A ) = 0 i {1,..., m}. Secret key: A. Public key: p 1,..., p m, q 1,..., q m. The subspace and the polynomials are chosen uniformly at random from the appropriate sets.
7 Motivation 7 / 27 Security of the Scheme Aaronson-Christiano (STOC 2012) Their scheme relies on HSP 2. Open Question (STOC 2012) Extension of the scheme to F q for any q 2. Challenge Is HSP q really a hard problem?
8 Motivation 8 / 27 Contributions Our Contributions Randomized polynomial-time algorithm for HSP q, q > d. Heuristic randomized polynomial-time algorithm for HSP 2. Experimentally verified and efficient in practice. Technique Algebraic cryptanalysis using Gröbner bases. We solve the challenge and master the complexity of solving.
9 Motivation 9 / 27 Algebraic Cryptanalysis 1 Solution of a problem Solution of a multivariate polynomial system. 2 Solve the system in practice and/or control the complexity of solving. Our Case (HSP q ) Algebraic modeling that allows to master the complexity. Similar modeling to the one used for IP in J.-C. Faugère, L. Perret. Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. EUROCRYPT 2006.
10 Motivation 10 / 27 Gröbner Bases F 5 Algorithm (J.-C.Faugère, 2002) Computation of a Gröbner basis of f 1,..., f r F q [x 1,..., x n ] equivalent to succesive reductions to row echelon form of M d = k i monomials of degree d k 1... k l t 1 f i t 2 f i , deg(t j f ij ) d. until for big enough d =d reg, the row echelon form of M dreg contains a GB.
11 Motivation 10 / 27 Gröbner Bases F 5 Algorithm (J.-C.Faugère, 2002) Computation of a Gröbner basis of f 1,..., f r F q [x 1,..., x n ] equivalent to succesive reductions to row echelon form of M d = k i monomials of degree d k 1... k l t 1 f i t 2 f i , deg(t j f ij ) d. until for big enough d =d reg, the row echelon form of M dreg contains a GB. Complexity Analysis Complexity of O(n ωdreg ), 2 ω 3 linear algebra constant. d reg difficult to estimate in general. In our case we can bound it.
12 Modeling 11 / 27 Contents 1 Motivation 2 Modeling 3 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d Heuristic Randomized Polynomial-time Algorithm for HSP 2 4 Conclusions and Open Problems
13 Modeling 12 / 27 First Approach Toy Example ( ) a1,1... a (p 1 = x 1 x 2 + x 1 + x 2 x 4 + x 4, p 2, p 3, p 4, q 1,..., q 4 ), A = 1,4 a 2,1... a 2,4 matrix of size 2 4. Let (y 1, y 2 ) be formal variables over F 2. p 1 ((y 1, y 2 )A) = 0 = (a 1,1 a 2,2 + a 2,1 a 1,2 + a 1,2 a 2,4 + a 2,2 a 1,4 ) y 1 y 2 + +(a 1,1 a 1,2 +a 1,2 a 1,4 +a 1,1 +a 1,4 ) y 1 +(a 2,1 a 2,2 +a 2,2 a 2,4 +a 2,1 +a 2,4 ) y 2 =
14 Modeling 13 / 27 First Approach Toy Example ( ) a1,1... a (p 1 = x 1 x 2 + x 1 + x 2 x 4 + x 4, p 2, p 3, p 4, q 1,..., q 4 ), A = 1,4 a 2,1... a 2,4 matrix of size 2 4. Let (y 1, y 2 ) be formal variables over F 2. p 1 ((y 1, y 2 )A) = 0 = (a 1,1 a 2,2 + a 2,1 a 1,2 + a 1,2 a 2,4 + a 2,2 a 1,4 ) y 1 y 2 + +(a 1,1 a 1,2 +a 1,2 a 1,4 +a 1,1 +a 1,4 ) y 1 +(a 2,1 a 2,2 +a 2,2 a 2,4 +a 2,1 +a 2,4 ) y 2 = Coeff(p 1, y 1 y 2 )y 1 y 2 + Coeff(p 1, y 1 )y 1 + Coeff(p 1, y 2 )y 2 = Coeff(p 1, y 1 y 2 ) = Coeff(p 1, y 1 ) = Coeff(p 1, y 2 ) = 0.
15 Modeling 14 / 27 First Approach Toy Example ( ) a1,1... a (p 1 = x 1 x 2 + x 1 + x 2 x 4 + x 4, p 2, p 3, p 4, q 1,..., q 4 ), A = 1,4 matrix a 2,1... a 2,4 of size 2 4. Let (y 1, y 2 ) be formal variables over F 2. p 1 ((y 1, y 2 )A) = 0 = (a 1,1 a 2,2 + a 2,1 a 1,2 + a 1,2 a 2,4 + a 2,2 a 1,4 ) y 1 y 2 + +(a 1,1 a 1,2 +a 1,2 a 1,4 +a 1,1 +a 1,4 ) y 1 +(a 2,1 a 2,2 +a 2,2 a 2,4 +a 2,1 +a 2,4 ) y 2 = Coeff(p 1, y 1 y 2 )y 1 y 2 + Coeff(p 1, y 1 )y 1 + Coeff(p 1, y 2 )y 2 = Coeff(p 1, y 1 y 2 ) = Coeff(p 1, y 1 ) = Coeff(p 1, y 2 ) = 0. Naive Model i {1,..., m}, t M ( F q [y 1,..., y n/2 ] ), SysNaive HSPq = { Coeff(p i, t) = 0, Coeff(q i, t) = 0.
16 Modeling 15 / 27 Optimizing the Model Key Observation If A is a solution of HSP q, for any S GL n/2 (F q ), SA is also a solution. Naive Model Has Many Equivalent Solutions. Not optimal. Canonical Form of the Solution of HSP q With probability n/2 γ q (n/2) = (1 1q ) i 1 1 q, A admits a basis in systematic form (I G), G = (g i,j ) is an n/2 n/2 matrix. i=1
17 Modeling 16 / 27 Our Model Optimizing the Model Naive system with A in systematic form. Our Model i {1,..., m}, t M ( F q [y 1,..., y n/2 ] ), Sys HSPq = { Coeff(p i, t) = 0, Coeff(q i, t) = 0.
18 Our Contributions 17 / 27 Contents 1 Motivation 2 Modeling 3 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d Heuristic Randomized Polynomial-time Algorithm for HSP 2 4 Conclusions and Open Problems
19 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d 18 / 27 HSP q, with q > d Linear Equations For all i {1,..., m}, j {1,..., n}, denoting by p i (1) = n λ p i,j x j, q (1) i = j=1 n λ q i,j x j, λ p i,j, λq i,j F q, j=1 i {1,..., m}, k {1,..., n/2}, the following equations are linear: n/2 Coeff(p i, y k ) = λ p i,k + λ p i,j+n/2 g k,j, j=1 n/2 Coeff(q i, y k ) = λ q i,k+n/2 λ q i,j g j,k. j=1
20 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d 19 / 27 HSP q, with q > d Matrix of Coefficients of Size mn n 2 /4 Has the Following Shape λ p i,n/ λ p i,n λ p i,n/ λ p i,n λ p i,n/ λ p i,n λ q j, λ q j, λ q j,n/ λ q j, λ q j, λ q j,n/ Full Rank of the Coefficient Matrix with Overwhelming Probability The probability is γ q(m) γ q(m n/2), m number of p i s.
21 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d 20 / 27 Randomized Polynomial-time Algorithm for HSP q Input: p 1,..., p m, q 1,..., q m F q [x 1,..., x n ] of degree d 3, n m 2n. 1 Construct the linear system {Coeff(p i, y k ), Coeff(q i, y k ), i {1,..., m}, j {1,..., n/2}}. 2 Solve it. Return this solution. Complexity O(n 2ω ), 2 ω 3 linear algebra constant. Success probability γ q (n/2)γ q (m) γ q (m n/2).
22 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d 21 / 27 Some Benchmarks for HSP q, q > d Table : Experiments performed for m = n with MAGMA v.19 d= 3 d= 4 n # Variables #Eqs q Exh. search Time O ( 2 576) 0.00s 0.00s O ( ) 0.02s 0.02s HSP q for big q is insecure!
23 22 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 HSP 2 Sys HSP2 No linear equations: all equations are of degree d with overwhelming probability. Reductions modulo the field equations. Very Overdetermined Non-Linear System The number of equations is at least [( ) ( )] n/2 n/2 2n n 2 /4. 1 d Behaviour when computing a Gröbner basis?
24 23 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 Some Benchmarks for HSP 2 Table : Experiments performed for m = n with MAGMA v.19 d = 3 n # Variables #Eqs d reg Exh. search Time O ( 2 49) 136s O ( 2 49) 2.30min O ( 2 81) 2h20 d = 4 n # Variables #Eqs d reg Exh. search Time O ( 2 36) 38s O ( 2 49) 66min
25 24 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 HSP 2 Structural Symmetries in Our Model If we order in increasing lexicographic order the monomials of degree d m i F 2 [ xn/2+1,..., x n ], m i F 2 [ x1,..., x n/2 ], and ti F 2 [ y1,..., y n/2 ], then Coeff ( m i, t j ) (d) = Coeff ( m j, t i ) (d).
26 24 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 HSP 2 Structural Symmetries in Our Model If we order in increasing lexicographic order the monomials of degree d m i F 2 [ xn/2+1,..., x n ], m i F 2 [ x1,..., x n/2 ], and ti F 2 [ y1,..., y n/2 ], then Coeff ( m i, t j ) (d) = Coeff ( m j, t i ) (d). Low Degree Equations Coeff(p, t j )+Coeff(q, t i )+ Coeff(q, t k )+ Coeff(p, t l ) = 0 {k i α k 0} {l j β l 0} is of degree d 1 and is a linear combination of the equations of Sys HSP2.
27 25 / 27 Our Contributions Heuristic Randomized Polynomial-time Algorithm for HSP 2 HSP 2 Behaviour of Sys HSP2 Degree falls not typically occurring in a random system of equations. Heuristically the degree of regularity is bounded by d + 1. Heuristic Randomized Polynomial-time Algorithm for HSP 2 Input: p 1,..., p m, q 1,..., q m F q [x] of degree d 3, n m 2n. 1 Compute a Gröbner basis J of Sys HSP2. Return the variety of J. Complexity O(n 2ω(d+1) ), 2 ω 3 linear algebra constant. Success probability γ 2 (n/2).
28 Conclusions and Open Problems 26 / 27 Contents 1 Motivation 2 Modeling 3 Our Contributions Randomized Polynomial-time Algorithm for HSP q, with q > d Heuristic Randomized Polynomial-time Algorithm for HSP 2 4 Conclusions and Open Problems
29 Conclusions and Open Problems 27 / 27 Conclusions and Open Problems Conclusions HSP q for big q is easy. Randomized polynomial-time algorithm for HSP q for big q. HSP 2 conjectured to be easy. Heuristic randomized polynomial-time algorithm for HSP 2. Open Problems 1 Noise-free version if the polynomials are not random but more structured (e.g., homogeneous of degree d)? 2 Noisy version?
Hybrid Approach : a Tool for Multivariate Cryptography
Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationA variant of the F4 algorithm
A variant of the F4 algorithm Vanessa VITSE - Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire PRISM CT-RSA, February 18, 2011 Motivation Motivation An example of algebraic cryptanalysis
More informationGröbner Bases in Public-Key Cryptography
Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis
More informationGröbner Bases. Applications in Cryptology
Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS with partial support of Celar/DGA FSE 20007 - Luxembourg E cient Goal: how Gröbner bases can be used to break
More informationIsomorphism of Polynomials : New Results
Isomorphism of Polynomials : New Results Charles Bouillaguet, Jean-Charles Faugère 2,3, Pierre-Alain Fouque and Ludovic Perret 3,2 Ecole Normale Supérieure {charles.bouillaguet, pierre-alain.fouque}@ens.fr
More informationComparison between XL and Gröbner Basis Algorithms
Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042
More informationOn the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems
On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems Bruno.Salvy@inria.fr Algorithms Project, Inria Joint work with Magali Bardet & Jean-Charles Faugère September 21st, 2006
More informationOn the Complexity of the Hybrid Approach on HFEv-
On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature
More informationAlgebraic Attack Against Trivium
Algebraic Attack Against Trivium Ilaria Simonetti, Ludovic Perret and Jean Charles Faugère Abstract. Trivium is a synchronous stream cipher designed to provide a flexible trade-off between speed and gate
More informationOn the relation of the Mutant strategy and the Normal Selection strategy
On the relation of the Mutant strategy and the Normal Selection strategy Martin Albrecht 1 Carlos Cid 2 Jean-Charles Faugère 1 Ludovic Perret 1 1 SALSA Project -INRIA, UPMC, Univ Paris 06 2 Information
More informationThe point decomposition problem in Jacobian varieties
The point decomposition problem in Jacobian varieties Jean-Charles Faugère2, Alexandre Wallet1,2 1 2 ENS Lyon, Laboratoire LIP, Equipe AriC UPMC Univ Paris 96, CNRS, INRIA, LIP6, Equipe PolSys 1 / 19 1
More informationPractical Analysis of Key Recovery Attack against Search-LWE Problem
Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate
More informationGröbner Bases. Applications in Cryptology
Gröbner - Crypto J.-C. Faugère Plan Gröbner bases: properties Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS Zero dim solve Algorithms Buchberger and Macaulay
More informationElliptic Curve Discrete Logarithm Problem
Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October
More informationAnalysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields
Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 278-283 Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields N. G. Kuzmina and E. B. Makhovenko Saint-Petersburg
More informationAlgebraic Cryptanalysis of Curry and Flurry using Correlated Messages
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Jean-Charles Faugère and Ludovic Perret SALSA Project INRIA, Centre Paris-Rocquencourt UPMC, Univ Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationUncloneable Quantum Money
1 Institute for Quantum Computing University of Waterloo Joint work with Michele Mosca CQISC 2006 1 Supported by NSERC, Sun Microsystems, CIAR, CFI, CSE, MITACS, ORDCF. Outline Introduction Requirements
More informationRésolution de systèmes polynomiaux structurés et applications en Cryptologie
Résolution de systèmes polynomiaux structurés et applications en Cryptologie Pierre-Jean Spaenlehauer University of Western Ontario Ontario Research Center for Computer Algebra Magali Bardet, Jean-Charles
More informationCalcul d indice et courbes algébriques : de meilleures récoltes
Calcul d indice et courbes algébriques : de meilleures récoltes Alexandre Wallet ENS de Lyon, Laboratoire LIP, Equipe AriC Alexandre Wallet De meilleures récoltes dans le calcul d indice 1 / 35 Today:
More informationGröbner Bases Techniques in Post-Quantum Cryptography
Gröbner Bases Techniques in Post-Quantum Cryptography Ludovic Perret Sorbonne Universités, UPMC Univ Paris 06, INRIA Paris LIP6, PolSyS Project, Paris, France Post-Quantum Cryptography Winter School, Fukuoka,
More informationA Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae PKC 2015, March 30 - April 1, Maryland, USA 2 Summary
More informationMultivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar?
Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar? Christian Eder, Jean-Charles Faugère and Ludovic Perret Seminar on Fundamental Algorithms, University
More informationLattice Reduction Attacks on HE Schemes. Martin R. Albrecht 15/03/2018
Lattice Reduction Attacks on HE Schemes Martin R. Albrecht 15/03/2018 Learning with Errors The Learning with Errors (LWE) problem was defined by Oded Regev. 1 Given (A, c) with uniform A Z m n q, uniform
More informationA distinguisher for high-rate McEliece Cryptosystems
A distinguisher for high-rate McEliece Cryptosystems JC Faugère (INRIA, SALSA project), A Otmani (Université Caen- INRIA, SECRET project), L Perret (INRIA, SALSA project), J-P Tillich (INRIA, SECRET project)
More informationAlgebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,
More informationThe F 4 Algorithm. Dylan Peifer. 9 May Cornell University
The F 4 Algorithm Dylan Peifer Cornell University 9 May 2017 Gröbner Bases History Gröbner bases were introduced in 1965 in the PhD thesis of Bruno Buchberger under Wolfgang Gröbner. Buchberger s algorithm
More informationMutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis
MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis Johannes Buchmann 1, Jintai Ding 2, Mohamed Saied Emam Mohamed 1, and Wael Said Abd Elmageed Mohamed 1 1 TU Darmstadt, FB Informatik
More informationStructural Cryptanalysis of McEliece Schemes with Compact Keys
Structural Cryptanalysis of McEliece Schemes with Compact Keys Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric De Portzamparc, Jean-Pierre Tillich To cite this version: Jean-Charles Faugère,
More informationSPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic
SPECTRA - a Maple library for solving linear matrix inequalities in exact arithmetic Didier Henrion Simone Naldi Mohab Safey El Din Version 1.0 of November 5, 2016 Abstract This document briefly describes
More informationDifferential Algorithms for the Isomorphism of Polynomials Problem
Differential Algorithms for the Isomorphism of Polynomials Problem Abstract. In this paper, we investigate the difficulty of the Isomorphism of Polynomials (IP) Problem as well as one of its variant IP1S.
More informationCryptanalysis of the Oil & Vinegar Signature Scheme
Cryptanalysis of the Oil & Vinegar Signature Scheme Aviad Kipnis 1 and Adi Shamir 2 1 NDS Technologies, Israel 2 Dept. of Applied Math, Weizmann Institute, Israel Abstract. Several multivariate algebraic
More informationPARALLEL MULTIPLICATION IN F 2
PARALLEL MULTIPLICATION IN F 2 n USING CONDENSED MATRIX REPRESENTATION Christophe Negre Équipe DALI, LP2A, Université de Perpignan avenue P Alduy, 66 000 Perpignan, France christophenegre@univ-perpfr Keywords:
More informationOn the query complexity of counterfeiting quantum money
On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum
More informationSolving LWE with BKW
Martin R. Albrecht 1 Jean-Charles Faugére 2,3 1,4 Ludovic Perret 2,3 ISG, Royal Holloway, University of London INRIA CNRS IIS, Academia Sinica, Taipei, Taiwan PKC 2014, Buenos Aires, Argentina, 28th March
More informationNew candidates for multivariate trapdoor functions
New candidates for multivariate trapdoor functions Jaiberth Porras 1, John B. Baena 1, Jintai Ding 2,B 1 Universidad Nacional de Colombia, Medellín, Colombia 2 University of Cincinnati, Cincinnati, OH,
More informationJean-Charles Faugère
ECC 2011 The 15th workshop on Elliptic Curve Cryptography INRIA, Nancy, France Solving efficiently structured polynomial systems and Applications in Cryptology Jean-Charles Faugère Joint work with: L Huot
More informationarxiv: v1 [cs.cr] 6 Apr 2015
New algorithm for the discrete logarithm problem on elliptic curves arxiv:1504.01175v1 [cs.cr] 6 Apr 2015 Igor Semaev Department of Informatics University of Bergen, Norway e-mail: igor@ii.uib.no phone:
More informationKey Recovery on Hidden Monomial Multivariate Schemes
Key Recovery on Hidden Monomial Multivariate Schemes Pierre-Alain Fouque 1, Gilles Macario-Rat 2, and Jacques Stern 1 1 École normale supérieure, 45 rue d Ulm, 75005 Paris, France {Pierre-Alain.Fouque,
More informationPractical Linear Algebra: A Geometry Toolbox
Practical Linear Algebra: A Geometry Toolbox Third edition Chapter 12: Gauss for Linear Systems Gerald Farin & Dianne Hansford CRC Press, Taylor & Francis Group, An A K Peters Book www.farinhansford.com/books/pla
More informationCharles Phelps Taft Research Center at the University of Cincinnati
Charles Phelps Taft Research Center at the University of Cincinnati Graduate Summer Fellowship Award Each section (I-III) should be placed at the start of a new page. All required materials must be included
More informationLittle Dragon Two: An efficient Multivariate Public Key Cryptosystem
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India October
More informationNew Directions in Multivariate Public Key Cryptography
New Directions in Shuhong Gao Joint with Ray Heindl Clemson University The 4th International Workshop on Finite Fields and Applications Beijing University, May 28-30, 2010. 1 Public Key Cryptography in
More informationAlgebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis
Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre
More informationComputing Generator in Cyclotomic Integer Rings
A subfield algorithm for the Principal Ideal Problem in L 1 K 2 and application to the cryptanalysis of a FHE scheme Jean-François Biasse 1 Thomas Espitau 2 Pierre-Alain Fouque 3 Alexandre Gélin 2 Paul
More informationSimple Matrix Scheme for Encryption (ABC)
Simple Matrix Scheme for Encryption (ABC) Adama Diene, Chengdong Tao, Jintai Ding April 26, 2013 dama Diene, Chengdong Tao, Jintai Ding ()Simple Matrix Scheme for Encryption (ABC) April 26, 2013 1 / 31
More informationFast Matrix Product Algorithms: From Theory To Practice
Introduction and Definitions The τ-theorem Pan s aggregation tables and the τ-theorem Software Implementation Conclusion Fast Matrix Product Algorithms: From Theory To Practice Thomas Sibut-Pinote Inria,
More informationPoly Dragon: An efficient Multivariate Public Key Cryptosystem
Poly Dragon: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India May 19, 2010
More informationCryptanalysis of the HFE Public Key Cryptosystem by Relinearization
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization Aviad Kipnis 1 and Adi Shamir 2 1 NDS Technologies, Israel 2 Computer Science Dept., The Weizmann Institute, Israel Abstract. The RSA
More informationSolving Underdetermined Systems of Multivariate Quadratic Equations Revisited
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited Enrico Thomae and Christopher Wolf Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum,
More informationAlmost polynomial Complexity for Zero-dimensional Gröbner Bases p.1/17
Almost polynomial Complexity for Zero-dimensional Gröbner Bases Amir Hashemi co-author: Daniel Lazard INRIA SALSA-project/ LIP6 CALFOR-team http://www-calfor.lip6.fr/ hashemi/ Special semester on Gröbner
More informationOn Polynomial Systems Arising from a Weil Descent
On Polynomial Systems Arising from a Weil Descent Christophe Petit and Jean-Jacques Quisquater UCL Crypto Group, Université catholique de Louvain Place du Levant 3 1348 Louvain-la-Neuve (Belgium) christophe.petit@uclouvain.be,
More informationDecoding linear codes via systems solving: complexity issues
Decoding linear codes via systems solving: complexity issues Stanislav Bulygin (joint work with Ruud Pellikaan) University of Kaiserslautern June 19, 2008 Outline Outline of the talk Introduction: codes
More informationQuantum Lightning Never Strikes the Same State Twice
Quantum Lightning Never Strikes the Same State Twice Or: Quantum Money from Cryptographic Assumptions Mark Zhandry Princeton University mzhandry@princeton.edu Abstract Public key quantum money can be seen
More informationImproved Cryptanalysis of HFEv- via Projection
Improved Cryptanalysis of HFEv- via Projection Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone PQ Crypto 2018 Fort Lauderdale, Florida 04/10/2018 A. Petzoldt Cryptanalysis of HFEv- via Projection
More informationSolving LWE problem with bounded errors in polynomial time
Solving LWE problem with bounded errors in polynomial time Jintai Ding, Southern Chinese University of Technology, University of Cincinnati, ding@mathucedu Abstract In this paper, we present a new algorithm,
More informationKey Recovery on Hidden Monomial Multivariate Schemes
Key Recovery on Hidden Monomial Multivariate Schemes Pierre-Alain Fouque 1, Gilles Macario-Rat 2, and Jacques Stern 1 1 École normale supérieure, 45 rue d Ulm, 75005 Paris, France {Pierre-Alain.Fouque,
More informationGroebner Bases and Applications
Groebner Bases and Applications Robert Hines December 16, 2014 1 Groebner Bases In this section we define Groebner Bases and discuss some of their basic properties, following the exposition in chapter
More informationOn the Existence of Semi-Regular Sequences
On the Existence of Semi-Regular Sequences Sergio Molina 1 joint work with T. J. Hodges 1 J. Schlather 1 Department of Mathematics University of Cincinnati DIMACS, January 2015 Sergio Molina (UC) Semi-Regular
More informationarxiv: v1 [cs.cr] 6 Jan 2013
On the complexity of the Rank Syndrome Decoding problem P. Gaborit 1, O. Ruatta 1 and J. Schrek 1 Université de Limoges, XLIM-DMI, 123, Av. Albert Thomas 87060 Limoges Cedex, France. philippe.gaborit,julien.schrek,olivier.ruatta@unilim.fr
More informationA new attack on RSA with a composed decryption exponent
A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj and Mohamed Ould Douh,2 Laboratoire de Mathématiques Nicolas Oresme Université de Caen, Basse Normandie, France abderrahmane.nitaj@unicaen.fr
More informationAlgebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis
Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre
More informationLecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma
CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 7: Schwartz-Zippel Lemma, Perfect Matching Lecturer: Shayan Oveis Gharan 01/30/2017 Scribe: Philip Cho Disclaimer: These notes have not
More informationMATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix.
MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix. Basis Definition. Let V be a vector space. A linearly independent spanning set for V is called a basis.
More informationMultivariate Public Key Cryptography
Winter School, PQC 2016, Fukuoka Multivariate Public Key Cryptography Jintai Ding University of Cincinnati Feb. 22 2016 Outline Outline What is a MPKC? Multivariate Public Key Cryptosystems - Cryptosystems,
More informationChapter 1: Systems of Linear Equations
Chapter : Systems of Linear Equations February, 9 Systems of linear equations Linear systems Lecture A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where
More information13. Systems of Linear Equations 1
13. Systems of Linear Equations 1 Systems of linear equations One of the primary goals of a first course in linear algebra is to impress upon the student how powerful matrix methods are in solving systems
More informationON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS
ON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS STAVROS KOUSIDIS AND ANDREAS WIEMERS Abstract We improve on the first fall degree bound of polynomial systems that arise from a Weil descent along Semaev
More informationPractical Analysis of Key Recovery Attack against Search-LWE Problem
Practical Analysis of Key Recovery Attack against Search-LWE Problem IMI Cryptography Seminar 28 th June, 2016 Speaker* : Momonari Kuo Grauate School of Mathematics, Kyushu University * This work is a
More informationHidden Symmetry Subgroup Problems
1/27 Hidden Symmetry Subgroup Problems Miklos Santha CNRS, Université Paris Diderot, France and Centre for Quantum Technologies, NUS, Singapore joint work with Thomas Decker Gábor Ivanyos Pawel Wocjan
More informationRow Space, Column Space, and Nullspace
Row Space, Column Space, and Nullspace MATH 322, Linear Algebra I J. Robert Buchanan Department of Mathematics Spring 2015 Introduction Every matrix has associated with it three vector spaces: row space
More informationTHIS paper investigates the difficulty of the Goppa Code
A Distinguisher for High Rate McEliece Cryptosystems Jean-Charles Faugère, Valérie Gauthier-Umaña, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich Abstract The Goppa Code Distinguishing (GCD problem
More informationJournal of Algebra 226, (2000) doi: /jabr , available online at on. Artin Level Modules.
Journal of Algebra 226, 361 374 (2000) doi:10.1006/jabr.1999.8185, available online at http://www.idealibrary.com on Artin Level Modules Mats Boij Department of Mathematics, KTH, S 100 44 Stockholm, Sweden
More informationImproved Cryptanalysis of HFEv- via Projection
Improved Cryptanalysis of HFEv- via Projection Jintai Ding 1, Ray Perlner 2, Albrecht Petzoldt 2, and Daniel Smith-Tone 2,3 1 Department of Mathematical Sciences, University of Cincinnati, Cincinnati,
More informationMath 1553, Introduction to Linear Algebra
Learning goals articulate what students are expected to be able to do in a course that can be measured. This course has course-level learning goals that pertain to the entire course, and section-level
More informationMa/CS 6b Class 20: Spectral Graph Theory
Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Eigenvalues and Eigenvectors A an n n matrix of real numbers. The eigenvalues of A are the numbers λ such that Ax = λx for some nonzero vector x
More informationCryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt 95
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt 95 Jean-Sébastien Coron and David Naccache Gemplus Card International 34 rue Guynemer, 92447 Issy-les-Moulineaux, France {jean-sebastien.coron,
More information1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT
1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations
More informationSummation polynomial algorithms for elliptic curves in characteristic two
Summation polynomial algorithms for elliptic curves in characteristic two Steven D. Galbraith and Shishay W. Gebregiyorgis Mathematics Department, University of Auckland, New Zealand. S.Galbraith@math.auckland.ac.nz,sgeb522@aucklanduni.ac.nz
More informationLazy Modulus Switching for the BKW Algorithm on LWE
Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht 1, Jean-Charles Faugère 3,,4, Robert Fitzpatrick 5, and Ludovic Perret,3,4 1 Technical University of Denmark, Denmark Sorbonne Universités,
More informationforms Christopher Engström November 14, 2014 MAA704: Matrix factorization and canonical forms Matrix properties Matrix factorization Canonical forms
Christopher Engström November 14, 2014 Hermitian LU QR echelon Contents of todays lecture Some interesting / useful / important of matrices Hermitian LU QR echelon Rewriting a as a product of several matrices.
More informationInoculating Multivariate Schemes Against Differential Attacks
Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower Department of Mathematical Sciences University of Cincinnati Cincinnati, OH 45221-0025 USA Email: ding@math.uc.edu,
More informationRounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences J. Bi, J-S. Coron, J-C. Faugère, P. Nguyen, G. Renault, R. Zeitoun Public Key Cryptography 2014 26-28 March, 2014
More informationarxiv: v3 [cs.sc] 3 May 2013
On the Complexity of Computing Gröbner Bases for Quasi-Homogeneous Systems arxiv:1301.5612v3 [cs.sc] 3 May 2013 Jean-Charles Faugère * Jean-Charles.Faugere@inria.fr ABSTRACT Mohab Safey El Din * Mohab.Safey@lip6.fr
More informationDecoding linear codes via systems solving: complexity issues and generalized Newton identities
Decoding linear codes via systems solving: complexity issues and generalized Newton identities Stanislav Bulygin (joint work with Ruud Pellikaan) University of Valladolid Valladolid, Spain March 14, 2008
More informationStatistical Machine Learning, Part I. Regression 2
Statistical Machine Learning, Part I Regression 2 mcuturi@i.kyoto-u.ac.jp SML-2015 1 Last Week Regression: highlight a functional relationship between a predicted variable and predictors SML-2015 2 Last
More informationFoundation of Intelligent Systems, Part I. Regression 2
Foundation of Intelligent Systems, Part I Regression 2 mcuturi@i.kyoto-u.ac.jp FIS - 2013 1 Some Words on the Survey Not enough answers to say anything meaningful! Try again: survey. FIS - 2013 2 Last
More informationWORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE
WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE JEFFREY B. FARR AND ROMAN PEARCE Abstract. We comment on the implementation of various algorithms in multivariate polynomial theory. Specifically, we describe
More informationPolynomial-Time Algorithms for Quadratic Isomorphism of Polynomials: The Regular Case
Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials: The Regular Case Jérémy Berthomieu a,b,c, Jean-Charles Faugère c,a,b, Ludovic Perret a,b,c a Sorbonnes Université, UPMC Univ Paris 06,
More informationOwen (Chia-Hsin) Chen, National Taiwan University
Analysis of QUAD Owen (Chia-Hsin) Chen, National Taiwan University March 27, FSE 2007, Luxembourg Work at Academia Sinica supervised by Dr. Bo-Yin Yang Jointly with Drs. Dan Bernstein and Jiun-Ming Chen
More informationSolving All Lattice Problems in Deterministic Single Exponential Time
Solving All Lattice Problems in Deterministic Single Exponential Time (Joint work with P. Voulgaris, STOC 2010) UCSD March 22, 2011 Lattices Traditional area of mathematics Bridge between number theory
More informationA NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT Abderrahmane Nitaj 1 and Mohamed Ould Douh 1,2 1 Laboratoire de Mathématiques Nicolas Oresme, Université de Caen, Basse Normandie, France Université
More informationLinear Algebra: Matrix Eigenvalue Problems
CHAPTER8 Linear Algebra: Matrix Eigenvalue Problems Chapter 8 p1 A matrix eigenvalue problem considers the vector equation (1) Ax = λx. 8.0 Linear Algebra: Matrix Eigenvalue Problems Here A is a given
More informationEnhancing the Signal to Noise Ratio
Enhancing the Signal to Noise Ratio in Differential Cryptanalysis, using Algebra Martin Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère and Ludovic Perret ESC 2010, Remich, 10.01.2010 Outline
More informationOn the Security and Key Generation of the ZHFE Encryption Scheme
On the Security and Key Generation of the ZHFE Encryption Scheme Wenbin Zhang and Chik How Tan Temasek Laboratories National University of Singapore tslzw@nus.edu.sg and tsltch@nus.edu.sg Abstract. At
More informationLecture 15: Algebraic Geometry II
6.859/15.083 Integer Programming and Combinatorial Optimization Fall 009 Today... Ideals in k[x] Properties of Gröbner bases Buchberger s algorithm Elimination theory The Weak Nullstellensatz 0/1-Integer
More informationShort Course in Quantum Information Lecture 2
Short Course in Quantum Information Lecture Formal Structure of Quantum Mechanics Course Info All materials downloadable @ website http://info.phys.unm.edu/~deutschgroup/deutschclasses.html Syllabus Lecture
More information1. Let r, s, t, v be the homogeneous relations defined on the set M = {2, 3, 4, 5, 6} by
Seminar 1 1. Which ones of the usual symbols of addition, subtraction, multiplication and division define an operation (composition law) on the numerical sets N, Z, Q, R, C? 2. Let A = {a 1, a 2, a 3 }.
More informationReconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems
Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems Chenqi Mou Wei Niu LMIB-School of Mathematics École Centrale Pékin and Systems Science Beihang University, Beijing 100191,
More informationQuantum Money. review articles. Imagine money you can carry and spend without a trace.
Quantum Money doi:10.1145/2240236.2240258 Imagine money you can carry and spend without a trace. By Scott Aaronson, Edward Farhi, David Gosset, Avinatan Hassidim, Jonathan Kelner, and Andrew Lutomirski
More informationLinearity Measures for MQ Cryptography
Linearity Measures for MQ Cryptography Simona Samardjiska 1,2 and Danilo Gligoroski 1 Department of Telematics, NTNU, Trondheim, Norway, 1 FCSE, UKIM, Skopje, Macedonia. 2 simonas@item.ntno.no,simona.samardjiska@finki.ukim.mk,
More information