Jean-Charles Faugère
|
|
- Anne Lyons
- 5 years ago
- Views:
Transcription
1 ECC 2011 The 15th workshop on Elliptic Curve Cryptography INRIA, Nancy, France Solving efficiently structured polynomial systems and Applications in Cryptology Jean-Charles Faugère Joint work with: L Huot G Renault and M Safey El Din, L Perret, PJ Spaenlehauer, L Bettale
2 Polynomial System Solving and Applications K L Multivariate Polynomial Problem (PoSSo) Input: (f 1,, f m ) K[x 1,, x n ] m Question: Find if any z L n such that Denote by V L the set of solutions f 1 (z) = = f m (z) = 0 Focus Algebraic Computations Exact methods Approach Algorithms and complexity analysis Applications to validate the performance Write efficient software (integration in Maple)
3 Gröbner Bases Buchberger (1965) In this talk we focus on Gröbner bases methods One of the fastest method to solve polynomial equations when K = L = F q or K = Q and L = R or L = C Other efficient methods: Numerical methods: homotopy methods (continuation methods) Resultants Triangular Sets SAT Solvers in the Boolean case K = L = F 2
4 Gröbner Bases Definition (Buchberger 65) I a polynomial ideal Gröbner basis (wrt a monomial ordering): G I a finite set of polynomials such that LM(I) = LM(G)
5 Gröbner Bases Definition (Buchberger 65) I a polynomial ideal Gröbner basis (wrt a monomial ordering): G I a finite set of polynomials such that LM(I) = LM(G) Theorem V F2 = ( no solution) iff G F2 = [1] V F2 has exactly one solution iff G F2 = [x 1 a 1,, x n a n ] where (a 1,, a n ) F n 2 Most of the time, if #V K < the shape of a Gröbner Basis for a lexicographical ordering x 1 > > x n is the following: h n (x n ) x n 1 h n 1 (x n ) Shape Position x 1 h 1 (x n )
6 Algorithms to compute GB Usually a two steps process: Input System Buchberger Gröbner Basis: total degree F 4 /F 5 rely on linear algebra Gröbner Basis: lexicographical FGLM: minimal polynomial of some matrix
7 Algebraic Cryptanalysis Crypto Computer Algebra
8 Algebraic Cryptanalysis A General Method for Cryptanalysis Security of a cryptosystem hardness of solving a related multivariate polynomial system Cryptosystem (+ messages, ciphertexts, ) Secret Modeling 4 x x + 6 y y z + 5 y + 1 = 0 5 x 2 + x y + 2 x z + 6 z z + 3 = 0 6 x z + 5 y y + 4 z z + 5 = 0
9 Algebraic Cryptanalysis A General Method for Cryptanalysis Security of a cryptosystem hardness of solving a related multivariate polynomial system Cryptosystem (+ messages, ciphertexts, ) Secret Modeling 4 x x + 6 y y z + 5 y + 1 = 0 5 x 2 + x y + 2 x z + 6 z z + 3 = 0 6 x z + 5 y y + 4 z z + 5 = 0 Solving x = 4 y = 2 z = 0
10 New trend Very often experiment is needed to test the efficiency of the solving step New trend Theoretical complexity analysis to explain the behavior of the attack This is also useful to help the designers of new cryptosystems Roadmap: Specificity of the Cryptosystem Structured System What is the complexity of solving Structured System?
11 Polynomial System Solving: structured systems K L Multivariate Polynomial Problem (PoSSo) Input: (f 1,, f m ) K[x 1,, x n ] m Question: Find if any one z L n such that f 1 (z) = = f m (z) = 0 NP-hard even when K = K 2
12 Polynomial System Solving: structured systems K L Multivariate Polynomial Problem (PoSSo) Input: (f 1,, f m ) K[x 1,, x n ] m Question: Find if any one z L n such that f 1 (z) = = f m (z) = 0 Try to identify families of systems which are easier to solve :
13 Polynomial System Solving: structured systems K L Multivariate Polynomial Problem (PoSSo) Input: (f 1,, f m ) K[x 1,, x n ] m Question: Find if any one z L n such that f 1 (z) = = f m (z) = 0 Try to identify families of systems which are easier to solve : Almost all systems occurring in applications have a special structure: Symmetries: equations are left invariant by the action of a finite group Sparse equations Overdetermined systems m n Multihomogeneous structure
14 Structured systems : several applications in Crypto [F,Perret,Safey,Spaenlehauer,Bettale] [F,Otmani,Perret,Tillich, EC] Multivariate Public Key Crypto HFE Error Correcting Codes McEliece [F,Huot,Renault] Point decomposition problem Twisted Edwards Curves [FLubicz, Robert, JA] Computing modular correspondences for Abelian Varieties Curves Multi-Homogeneous Systems Takes advantage of the structure of the system to speed up the resolution Structure comes from the action of the automorphisms of the theta group or additional symmetries twisted Edwards Curves
15 Main results/examples Motivation to use the structure! For (regular) quadratic systems: Overdetermined systems: n variables Semi-regular m = c n α equations [Bardet, F,Salvy] { Sub Exponential if 1 < α < 2 Polynomial if α = 2
16 Main results/examples Motivation to use the structure! For (regular) quadratic systems: Overdetermined systems: n variables Semi-regular m = c n α equations [Bardet, F,Salvy] { Sub Exponential if 1 < α < 2 Polynomial if α = 2 Use the fact that we are over F q : [Bettale, F,Perret, JMC] : Hybrid Method direct Gröbner basis approach hybrid approach 2 18 n UOV q = 2 8, n = 60 security (Gröbner) 2 59 [Bardet, F,Salvy, Spaenlehauer] faster than exhaustive search over F 2 (K = L = F 2 ) complexity n n = faster
17 Motivation Bilinear systems: f i (X, Y) = c i,x,y x y where n = #X + #Y x X,y Y complexity is polynomial in #Solutions= ( ) n #X 2 n [JSC2011,F,Safey El Din, Spaenlehauer] Applications: MinRank/HFE: [Crypto 2008] s [Issac 2010] 935s Challenge A 20 (Variant of McEliece): 24 hours (Magma) 005 sec [EC2010, F, Otmani,] Perret, Tillich]
18 Motivation Bilinear systems: f i (X, Y) = c i,x,y x y where n = #X + #Y x X,y Y complexity is polynomial in #Solutions= ( ) n #X 2 n [JSC2011,F,Safey El Din, Spaenlehauer] Applications: MinRank/HFE: [Crypto 2008] s [Issac 2010] 935s Challenge A 20 (Variant of McEliece): 24 hours (Magma) 005 sec [EC2010, F, Otmani,] Perret, Tillich] Use the symmetries: [JA, F,Lubicz,Robert] : the action of the automorphisms of the theta group > 24 hours 01 sec [F,Huot, Renault] symmetries related to twisted Edwards Curves this talk! divides by 2 n 1 the number of solutions/complexity untractable system 4h25min
19 Sparse Equations Boolean Case K = L = F 2 Sparse = each equation depends on l variables, the expected complexity of the Agreeing-Gluing Algorithm is: O(2 0711n ) when l = 6 O(2 0405n ) when l = 3 I Semaev Sparse algebraic equations over finite fields SIAM J Comput, 39(2): , 2009
20 Structure inside Gröbner basis computation F 4 /F 5 algorithms develop specific linear algebra algorithms and implementations linear algebra: a key step for Gröbner bases take into account the specific properties of the matrices Minrank: [Issac 2010] 935s [Pasco 2010] 73s
21 Structure inside Gröbner basis computation matrices involved in FGLM are sparse (even for random system) Theorem (F-Mou, 2011) % of nonzero entries: 6 1 π d n d = deg(f i) Use of sparse algorithms Random: [Magma] 1084s [Issac 2011] 071s Systems with 2 16 solutions are tractable Random(n=3, d=10): , 686%
22 Sketch of the algorithms: Macaulay matrix in degree d I = F = f 1,, f p deg(f i ) = d i a monomial ordering Macaulay (F, d) is the following matrix: Rows: all products t f i where deg(t) (d d i ) Columns: monomials of degree d t 1 f k1 m 1 m l c i,j = coeff(t i f ki, m j ) t s f ks Row echelon forms of the Macaulay matrices = Gröbner basis
23 Sketch of the algorithms: Macaulay matrix in degree d I = F = f 1,, f p deg(f i ) = d i a monomial ordering Macaulay (F, d) is the following matrix: Rows: all products t f i where deg(t) (d d i ) Columns: monomials of degree d t 1 f k1 m 1 m l c i,j = coeff(t i f ki, m j ) t s f ks Row echelon forms of the Macaulay matrices = Gröbner basis Algorithmic Problem Rank defect = useless computations Goal: build full rank matrices (for instance F 5 ) for regular sequences
24 Complexity of Computing Gröbner Bases Definition Degree of regularity d reg : indicator of the complexity of GB algorithms for homogeneous polynomials: the lowest integer d st all monomials of degree d are in LM(I) maximal degree of a grevlex Gröbner basis is d reg
25 Complexity of Computing Gröbner Bases Definition Degree of regularity d reg : indicator of the complexity of GB algorithms for homogeneous polynomials: the lowest integer d st all monomials of degree d are in LM(I) maximal degree of a grevlex Gröbner basis is d reg Hilbert Series Generating series: HS(t) = d=0 r dt d, where r d = # Cols Rank(Macaulay(F, d)) Finite number of solution: HS(t) = d reg 1 d=0 r d t d
26 Complexity of Computing Gröbner Bases Definition Degree of regularity d reg : indicator of the complexity of GB algorithms for homogeneous polynomials: the lowest integer d st all monomials of degree d are in LM(I) maximal degree of a grevlex Gröbner basis is d reg Hilbert Series Generating series: HS(t) = d=0 r dt d, where r d = # Cols Rank(Macaulay(F, d)) Finite number of solution: HS(t) = d reg 1 d=0 r d t d Theorem Complexity of computing a grevlex (( Gröbner ) basis: n + ω ) dreg O n
27 Example of generating series Theorem n quadratic equations f i over Q then under some regularity assumption: HS(t) = (1 + t) n
28 Example of generating series Theorem n quadratic equations f i over Q then under some regularity assumption: HS(t) = (1 + t) n Consequently, d reg = n + 1 Example Q, n = m = 50 quadratic equations (1 + z) 50 = z + + z z 51 Hence the maximal degree occurring in the computation is 51
29 F 5 algorithm: simple matrix version Get rid of the trivial relations: Incremental algorithm f i f j f j f i = 0 fi 2 f i = 0 when K = F 2 (f 1 ) + G prev Incremental degree by degree Special/Simpler version of F 5 for dense/generic quadratic polynomials the maximal degree D is a parameter of the algorithm m 1 m 2 m 3 m 4 m 5 u 1 f 1 1 x x x x 0 x x x u r1 f x x v rk 1 f k x x w 1 f k x w 2 f k
30 F5: compute Groebner ( f 1,, f k ), d + 1) Already computed Groebner ( f 1,, f k ), d) Matrix in degree d m 1 m 2 m 3 m 4 m 5 u 1 f 1 1 x x x x 0 x x x u r1 f x x v rk 1 f k x x w 1 f k x w 2 f k
31 F5: compute Groebner ( f 1,, f k ), d + 1) Matrix in degree d m 1 m 2 m 3 m 4 m 5 u 1 f 1 1 x x x x 0 x x x u r1 f x x v rk 1 f k x x w 1 f k x w 2 f k
32 F5: compute Groebner ( f 1,, f k ), d + 1) Matrix in degree d m 1 m 2 m 3 m 4 m 5 u 1 f 1 1 x x x x 0 x x x u r1 f x x v rk 1 f k x x w 1 f k x w 2 f k if w 1 = x α 1 1 x α j j
33 F5: compute Groebner ( f 1,, f k ), d + 1) Matrix in degree d m 1 m 2 m 3 m 4 m 5 u 1 f 1 1 x x x x 0 x x x u r1 f x x v rk 1 f k x x w 1 f k x w 2 f k if w 1 = x α 1 1 x α j j Matrix in degree d + 1 t 1 t 2 t 3 t 4 t 5 w 1 x j f k 0 1 x x x w 1 x j+1 f k x x w 1 x nf k x
34 F5: compute Groebner ( f 1,, f k ), d + 1) Matrix in degree d m 1 m 2 m 3 m 4 m 5 u 1 f 1 1 x x x x 0 x x x u r1 f x x v rk 1 f k x x w 1 f k x w 2 f k if w 1 = x α 1 1 x α j j Matrix in degree d + 1 t 1 t 2 t 3 t 4 t 5 w 1 x j f k 0 1 x x x w 1 x j+1 f k x x w 1 x nf k x
35 F5: compute Groebner ( f 1,, f k ), d + 1) Matrix in degree d m 1 m 2 m 3 m 4 m 5 u 1 f 1 1 x x x x 0 x x x u r1 f x x v rk 1 f k x x w 1 f k x w 2 f k if w 1 = x α 1 1 x α j j Matrix in degree d + 1 t 1 t 2 t 3 t 4 t 5 w 1 x j f k 0 1 x x x w 1 x j+1 f k x x w 1 x nf k x Remove w 1 x j+1 f k iff w 1 x j+1 LT( f 1,, f k 1 )
36 F5: compute Groebner ( f 1,, f k ), d + 1) Matrix in degree d m 1 m 2 m 3 m 4 m 5 u 1 f 1 1 x x x x 0 x x x u r1 f x x v rk 1 f k x x w 1 f k x w 2 f k if w 1 = x α 1 1 x α j j Matrix in degree d + 1 t 1 t 2 t 3 t 4 t 5 w 1 x j f k 0 1 x x x w 1 x j+1 f k x x w 1 x nf k x Remove w 1 x j+1 f k iff w 1 x j+1 LT(Groebner ( f 1,, f k 1 ), d 1)
37 F 5 criterion complexity of overdetermined systems with M Bardet and B Salvy Criterion: t f j is in the matrix if t / Id(LT < (G j 1 )), where G j 1 is a Gröbner basis of {f 1,, f j 1 } R d,i (n) number of rows in the matrix generated by F 5 when computing a Gröbner basis of [f 1,, f i ] in degree d
38 Induction When d 2 : R d,i (n) = i M d 2 (n) }{{} number of monomials degree d 2 i 1 j=1 R d 2,j (n) } {{ } F 5 criterion
39 Induction When d 2 : R d,i (n) = i M d 2 (n) }{{} number of monomials degree d 2 i 1+δ K,F2 j=1 R d 2,j (n) } {{ } F 5 criterion
40 End of the computation #row= R d,m (n) #col= M d (n) Matrix generated by F5
41 End of the computation #row= R d,m (n) #col= M d (n) Matrix generated by F5
42 End of the computation #row= R d,m (n) #col= M d (n) Matrix generated by F5 When h d,m (n) = #col #row = 0 this end of the computation! We compute the biggest real root n > 0 of h d,m (n) = 0
43 Example For quadratic equations, m = n over F 2 : using the previous relation we can compute explicitly: U 0,i (n) = U 1,i (n) = 0 U 2,i (n) = i ( n 0) 0 = i U 3,i (n) = i ( n 1 ) i U 1,j (n) = i n j=1
44 Example For quadratic equations, m = n over F 2 : using the previous relation we can compute explicitly: U 0,i (n) = U 1,i (n) = 0 U 2,i (n) = i ( n 0) 0 = i U 3,i (n) = i ( n 1 Then: ) i U 1,j (n) = i n j=1 h 3,n (n) = M 3 (n) U 3,n (n) = ( ) n 3 n 2 = n(n2 9 n+2) 6
45 Example For quadratic equations, m = n over F 2 : using the previous relation we can compute explicitly: U 0,i (n) = U 1,i (n) = 0 U 2,i (n) = i ( n 0) 0 = i U 3,i (n) = i ( n 1 Then: ) i U 1,j (n) = i n j=1 h 3,n (n) = M 3 (n) U 3,n (n) = ( ) n 3 n 2 = n(n2 9 n+2) 6 The biggest real root of this polynomial: ( h 3,n (n)=n n 9/2 1/2 ) ( 73 n 9/2 + 1/2 ) 73
46 Example h 3,n (n)=n ( n 9/2 1/2 ) ( 73 n 9/2 + 1/2 ) 73 biggest real root is: 9/2 + 1/ so that N 3 = 9
47 Example h 3,n (n)=n ( n 9/2 1/2 ) ( 73 n 9/2 + 1/2 ) 73 biggest real root is: 9/2 + 1/ so that N 3 = 9 Hence d 3 when n 9 : d N d
48 Example h 3,n (n)=n ( n 9/2 1/2 ) ( 73 n 9/2 + 1/2 ) 73 biggest real root is: 9/2 + 1/ so that N 3 = 9 Hence d 3 when n 9 : d N d n < 9 = N 3 the maximal degree in F 5 is 3; the total complexity O(n 3ω ) 2 N 3 = 9 n < N 4 = 16 the maximal degree is 4 and complexity is O(n 4ω ) 3
49 Generating series Theorem f i of degree d i, i = 1,, m finite field F q then H m = d=0 h d,m z d = m i=1 ( 1 (1 δ K,F2 ) z d i 1+δ K,F2 z d i ) ( ) n 1 δ K,F2 z 2 1 z
50 Generating series Theorem f i of degree d i, i = 1,, m finite field F q then H m = d=0 h d,m z d = m i=1 ( 1 (1 δ K,F2 ) z d i 1+δ K,F2 z d i particular case: d i = 2, F 2, n = m equations h d,n z d = d=0 ( ) 1 + z n 1 + z 2 ) ( ) n 1 δ K,F2 z 2 1 z
51 Generating series particular case: d i = 2, F 2, n = m equations Example h d,n z d = d=0 ( ) 1 + z n 1 + z 2 F 2, n = m = 50 semi-regular quadratic equations ( 1+z 1+z 2 ) 50 = z z z z z z z z z 9 +O ( z 10) Hence the maximal degree occurring in the computation is 9
52 Asymptotic estimate biggest real root of h d,n = 1 ( ) 1 + z n dz 2iπ C 1 + z 2 z d+1 d n = 1 λ 0 n λ 1 n O( 1 ) 4 λ 3 0 n 1 3 d n n n O( 1 where λ 0 = 3/ /2 + 1/ the expression of λ 1 contains the biggest real root of the Airy function (solution of 2 y zy = 0) z 2 The formula is almost exact when n 3! n 1 3 )
53 Maximal degree 16 Maximal Degree in the Gröbner basis computation 14 random system HFE 128<d<513 HFE 16<d<129 HFE 3<d< n
54 Complexity: overdetermined systems k is a constant (does not depend on n) d i total degree of f i Under regularity assumption: m Degree d max m n K, d i = 2 m + 1 ( Macaulay bound) m n K 1 + n+1 (d i 1) ( Macaulay bound) i=1 n + k K, d i = 2 m 2 h k,1 n + k K n+k i=1 m d i 1 2 h k,1 2 + o(1) n+k i=1 d 2 i o(1) 2 n K, d i = 2 n n n O k n K, d i = 2 (k 1 2 k(k 1))n + a 1 2(k(k 1)) 1 6 n F 2, d i = 2 n n O(n 1 3 ) k n F 2, d i = 2 ( k ( ) n 2 3 n O(1) 2k(k 5) 1 + 2(k + 2) k(k + 2) ) n
55 Classification Classification: m number of polynomials, n number of variables m = cste n m = cste n α m = cste n 2 Complexity single exponential sub exponential polynomial
56 Bilinear Equations in Algebraic Attacks: Motivation Powerful attack somewhat similar to Lattice attacks: we consider k vectors v i = [, v i,j, ] with v i,j Z Try to find: (λ 1,, λ k ) Z k such that k λ i v i is small i=1
57 Bilinear Equations in Algebraic Attacks: Motivation Powerful attack somewhat similar to Lattice attacks: we consider k vectors v i = [, v i,j, ] with v i,j Z Try to find: (λ 1,, λ k ) Z k such that k λ i v i is small i=1 using LLL: find a small vector in Polynomial Time
58 Bilinear Equations in Algebraic Attacks: Motivation For k quadratic multivariate polynomials f i K[x 1,, x n ]: [ 2 ] f f l H(f l ) = M l = l x i x j 1 i,j n Try to find: (λ 1,, λ k ) K k such that: k λ i M i is small i=1 matrix representation of f i
59 Bilinear Equations in Algebraic Attacks: Motivation For k quadratic multivariate polynomials f i K[x 1,, x n ]: [ 2 ] f f l H(f l ) = M l = l x i x j 1 i,j n Try to find: (λ 1,, λ k ) K k such that: k λ i M i is of small rank i=1 matrix representation of f i
60 Bilinear Equations in Algebraic Attacks: Motivation For k quadratic multivariate polynomials f i K[x 1,, x n ]: [ 2 ] f f l H(f l ) = M l = l x i x j 1 i,j n matrix representation of f i Try to find: (λ 1,, λ k ) K k such that: k λ i M i is of rank r Minrank Problem i=1
61 Bilinear Equations in Algebraic Attacks: Motivation For k quadratic multivariate polynomials f i K[x 1,, x n ]: [ 2 ] f l f l H(f l ) = M l = x i x j 1 i,j n Try to find: (λ 1,, λ k ) K k such that: matrix representation of f i k λ i M i is of rank r Minrank Problem i=1 That is to say: in some basis k i=1 λ if i depends only on r variables
62 Two algebraic modelings: structured equations M = M 0 k i=1 λ im i The minors modeling Rank(M) r all minors of size (r + 1) of M vanish ( m r+1) 2 equations of degree r + 1 k variables The Kipnis-Shamir modeling Rank(M) r x (1),, x (m r) Ker(M) I m r M x (1) 1 x (m r) 1 = 0 x (1) r x (m r) r Few variables, lots of equations, high degree!! Applications of bilinear equations in Crypto: Cryptanalysis of HFE and MinRank [CRYPTO 08, ISSAC 10, PKC 11] Cryptanalysis of McEliece [EUROCRYPT 10] m(m r) bilinear equations k + r(m r) variables
63 Bilinear systems joint work with M Safey El Din and PJ Spaenlehauer F = (f 1,, f m ): system of homogeneous bilinear equations f i (X, Y) = x X,y Y f 1 x 0 jac X (F i ) = f i x 0 Euler relations c i,x,y x y where n = #X + #Y f 1 x n x f i x n x jac Y (F i) = f = f x j = f y j x j y j x 0 f 1 y 0 f i y 0 1 f = jac X (F i ) = jac Y (F i ) f i x nx y 0 y ny f 1 y n y f i y n y
64 Complexity of affine bilinear systems In affine case: x 0 = 1, y 0 = 1 and the number of variables is n = n X + n Y Theorem: degree of regularity [JSC 2011] Degree of regularity of a generic 0-dim affine bilinear system for the grevlex ordering: d reg 1 + min(n x, n y ) Sharp bound in practice
65 Degree of regularity: idea of the proof Affine: x 0 = 1 Choose the block of variables of smallest cardinality, we assume n X n Y I = f 1,, f n Bilinear system of K[X, Y ] J X x = f 1 f 1 x nx x 0 f n x 0 f n x nx 1 x 1 = 0 x nx
66 Degree of regularity: idea of the proof Affine: x 0 = 1 Choose the block of variables of smallest cardinality, we assume n X n Y I = f 1,, f n Bilinear system of K[X, Y ] J X x = f 1 f 1 x nx x 0 f n x 0 f n x nx 1 x 1 = 0 x nx J X is singular! J X is a singular p q = (n X + 1) (n X + n Y ) matrix = all the maximal minors are = 0!
67 Degree of regularity: idea of the proof I = f 1,, f n Bilinear system of K[X, Y ] J X x = f 1 f 1 x nx x 0 f n x 0 f n x nx 1 x 1 = 0 x nx J X is singular! J X is a singular p q = (n X + 1) (n X + n Y ) matrix = all the maximal minors are = 0! Determinantal miracle! A Theorem of Bernstein, Sturmfels and Zelevinski M a p q matrix whose entries are variables The maximal minors of M are a universal Gröbner basis
68 Degree of regularity: idea of the proof J X is singular! J X is a singular p q = (n X + 1) (n X + n Y ) matrix = all the maximal minors are = 0! Extension of the Theorem of Bernstein, Sturmfels and Zelevinski [JSC 2011] J X a p q linear matrix with coefficients in K[y 1,, y ny ], the maximal minors of M are a grevlex Gröbner basis LM(Minors(J X )) = all monomials of degree n X + 1 in y 1,, y ny
69 Degree of regularity: idea of the proof J X is singular! J X is a singular p q = (n X + 1) (n X + n Y ) matrix = all the maximal minors are = 0! Extension of the Theorem of Bernstein, Sturmfels and Zelevinski [JSC 2011] J X a p q linear matrix with coefficients in K[y 1,, y ny ], the maximal minors of M are a grevlex Gröbner basis LM(Minors(J X )) = all monomials of degree n X + 1 in y 1,, y ny Rewrite J X x = A(y) x 1 + b = 0 Cramer s rule : x 1 det(a(y)) x nx + Adj(A)b I x nx
70 Degree of regularity: idea of the proof J X is singular! J X is a singular p q = (n X + 1) (n X + n Y ) matrix = all the maximal minors are = 0! Extension of the Theorem of Bernstein, Sturmfels and Zelevinski [JSC 2011] J X a p q linear matrix with coefficients in K[y 1,, y ny ], the maximal minors of M are a grevlex Gröbner basis LM(Minors(J X )) = all monomials of degree n X + 1 in y 1,, y ny Rewrite Cramer s rule : J X x = A(y) x 1 x nx x 1 x nx + b = 0 + det(a(y)) 1 Adj(A)b I
71 Degree of regularity: idea of the proof J X is singular! J X is a singular p q = (n X + 1) (n X + n Y ) matrix = all the maximal minors are = 0! Extension of the Theorem of Bernstein, Sturmfels and Zelevinski [JSC 2011] J X a p q linear matrix with coefficients in K[y 1,, y ny ], the maximal minors of M are a grevlex Gröbner basis LM(Minors(J X )) = all monomials of degree n X + 1 in y 1,, y ny Rewrite Cramer s rule : J X x = A(y) x 1 x nx x 1 x nx + b = 0 + det(a(y)) 1 Adj(A)b I Any n X j=1 x α j ny j k=1 y β k k n Y k=1 y γ k k mod Minors(J X ) with γ k n X
72 Trivial Syzygies of Bilinear Systems An example with small parameters: n x = n y = 2, m = 4 We rewrite the usual trivial syzygie as: 0 = f 2 f 1 f 1 f 2 = f 1 f 2 f 1 f 2
73 Trivial Syzygies of Bilinear Systems An example with small parameters: n x = n y = 2, m = 4 We rewrite the usual trivial syzygie as: 0 = f 2 f 1 f 1 f 2 = f 1 f 2 f 1 f 2 Theorem (Trivial Syzygies) When n x = n y = 2, m = 4 the trivial syzygies of a generic bilinear system are: f f 1 f 2 f 3 f 4 i f j f 1 f 2 f 3 f 4 f 1 f 2 f 3 f 4 f i f j i j, x 0 x 0 x 0 x 0 f 1 f 2 f 3 f 4, x 1 x 1 x 1 x 1 jac Y (F 4 ) f 1 f 2 f 3 f 4 x 2 x 2 x 2 x 2
74 Results 1 Variant of F 5 : avoid computing zero 2 Characterize a nice subclass of systems we defined a notion of biregularity Theorem Generically, bilinear systems are biregular, ie the set of biregular bilinear systems is a Zariski nonempty open subset 3 Generic Hilbert series HS I (t 1, t 2 ) = dim(k[x, Y ] α,β /I α,β )t α 1 tβ 2 We can compute it explicitly! 4 Complexity analysis
75 Complexity Solving affine bilinear systems The complexity of computing a grevlex Gröbner basis of a zero-dimensional ideal generated by generic affine bilinear polynomials is polynomial in the number of solutions ( n n x ) = ( n n y ) ( O(Monomials(1 + min(n x, n y )) ω ) O 2 ω min(nx,ny )) Consequences: n x constant, n y grows = complexity polynomial in n y X and Y unbalanced easy to solve Better than Macaulay bound: ( O(Monomials(n x + n y + 1) ω ) O 2 ω(nx +ny )) n X is a constant in the case of Minrank challenges!
76 Solving Systems with Symmetries G is a finite group Compute the roots of the system: V L = {z L n f 1 (z) = = f m (z) = 0} Two cases: Most difficult case: V L is invariant by G: if z V L then σ z V L for all σ G Open Issue to compute efficiently V L /G even if G = S n
77 Solving Systems with Symmetries G is a finite group Compute the roots of the system: V L = {z L n f 1 (z) = = f m (z) = 0} Two cases: Most difficult case: V L is invariant by G: if z V L then σ z V L for all σ G Open Issue to compute efficiently V L /G even if G = S n Each equation is invariant by G σ f i = f i for all σ G
78 Invariant ring Definition K[x 1,, x n ] and G GL(K, n) a linear group acting on K n K[x 1,, x n ] G = {p K[x 1,, x n ] σ p = p for all σ G} where (σ p)(v) = p(σ 1 v) for all v K n Hilbert s finiteness theorem If G is a linear group then its invariant ring is finitely generated Theorem K[x 1,, x n ] Sn = K[e 1,, e n ] where e k = x i1 x i2 x ik is the k th elementary symmetric polynomial 1 i 1 <i 2 <<i k n
79 Hironaka decomposition There exist G is a linear group = K[x 1,, x n ] G primary invariants θ 1,, θ n K[x 1,, x n ] G algebraically independent secondary invariants η 1,, η t K[x 1,, x n ] G Method proposed by [Sturmfels]: Each equation: f K[x 1,, x n ] G f (θ 1,, θ n, η 1,, η t )
80 Hironaka decomposition There exist G is a linear group = K[x 1,, x n ] G primary invariants θ 1,, θ n K[x 1,, x n ] G algebraically independent secondary invariants η 1,, η t K[x 1,, x n ] G Method proposed by [Sturmfels]: Each equation: f K[x 1,, x n ] G f (θ 1,, θ n, η 1,, η t ) OK : we compute a Gröbner basis of I(V L /G) NOK: the resulting system is often more difficult to solve than the original! we have n + t variables the η 1,, η t are not independent Add equations: F(η 1,, η t ) = 0
81 First easy case: each equation is invariant Example (Cyclic n problem) G = C n x x n = 0 x 1 x x i x i+1 + = 0 + x i x i+1 x i+k 1 + = 0 x 1 x 2 x n = 1 R(f ) = 1 #G σf Reynolds σ G
82 First easy case: each equation is invariant Example (Cyclic n problem) G = C n R(x 1 ) = 0 R(x 1 x 2 ) = 0 R(f ) = 1 R(x 1 x 2 x k 1 ) = 0 #G x 1 x 2 x n = 1 σf Reynolds σ G Very compact representation!
83 First easy case: each equation is invariant Example (Cyclic n problem) G = C n R(x 1 ) = 0 R(x 1 x 2 ) = 0 R(x 1 x 2 x k 1 ) = 0 x 1 x 2 x n = 1 R(f ) = 1 #G σf Reynolds σ G Very compact representation! Theory to adapt Gröbner basis theory: Subalgebra Analog to Gröbner Basis for Ideals = SAGBI LRobbiano and M Sweedler Subalgebra bases Commutative algebra, pp in LMM 1430, Springer, 1990 D Kapur and K Madlener, A completion procedure for computing a canonical basis for a k-subalgebra",
84 First easy case: each equation is invariant Example (Cyclic n problem) G = C n R(x 1 ) = 0 R(x 1 x 2 ) = 0 R(x 1 x 2 x k 1 ) = 0 x 1 x 2 x n = 1 R(f ) = 1 #G σf Reynolds σ G Very compact representation! SAGBI Gröbner Bases : in general infinite! Propose efficient algorithms (variants of F 5 and FGLM) to represent solutions of the system by another system in e 1,, e n Example Cyclic n = 5 Symmetric Gröbner basis: [e 1, 125 e 2 + e 3 4, e e 3, e 4, e 5 1]
85 Algorithm [F, Rahmany, 2009] D-Sagbi Matrix F 5 -Inv algorithm Input System in K[x 1,, x n ] G FGLM-Invariant algorithm no D := D + 1 Gröbner basis in the invariant ring K[e 1,, e n ] where e i is the i-th elementary symmetric polynomial D- Sym Gröbner basis in K[e 1,, e n ] Test Zero Dim? yes Solutions recovering L n solutions
86 Experiments n D F 5 -invariant Magma (F4) cyclic s 1361 s cyclic s "Killed" cyclic h 54 m cyclic h 34m
87 Experiments n D F 5 -invariant Magma (F4) cyclic s 1361 s cyclic s "Killed" cyclic h 54 m cyclic h 34m Reduced size of the computed objects: #Solutions #polynomials Max length of poly C 7 lex inv C 7 lex C 8 lex dim inv C 8 lex dim inv C 9 lex dim
88 Second easy case: G is a reflection group Theorem (Chevalley, Shepard, Todd) If char(k) #G then G is a reflection group = K[x 1,, x n ] G = K[θ 1,, θ n ] where θ 1,, θ n K[x 1,, x n ] are algebraically independent
89 Second easy case: G is a reflection group Theorem (Chevalley, Shepard, Todd) If char(k) #G then G is a reflection group = K[x 1,, x n ] G = K[θ 1,, θ n ] where θ 1,, θ n K[x 1,, x n ] are algebraically independent Example (DLP Edwards) Consider a set of symmetric equations In addition we assume that (y 1,, y n ) V L = ( y 1, y 2, y 3,, y n ) V L = (y 1, y 2, y 3,, y n ) V L even number change of signs on {y 1,, y n }
90 Second easy case: G is a reflection group Example (DLP Edwards) Consider a set of symmetric equations In addition we assume that (y 1,, y n ) V L = ( y 1, y 2, y 3,, y n ) V L = (y 1, y 2, y 3,, y n ) V L n 2 ( n ) i=0 2i = 2 n 1 even number change of signs on {y 1,, y n } Definition (Coxeter Group) D n is the symmetry group of the n-demi hypercube Theorem D n = (Z/2Z) n 1 S n = #D n = n! 2 n 1 F q [y 1,, y n ] Dn = F q [E 1,, E n 1, e n ] where E i = e i (y 2 1,, y 2 n ) the i th elementary symmetric polynomial in terms of y 2 i
91 DLP Discrete Logarithm Problem (DLP) Input: finite group G and g, h G, Question: Find if any an integer x such that h = [x] g For any G, generic algorithms O ( #G ) G = (F q, ), index calculus sub-exponential G = (J C (F q ), +) if g > 2 index calculus sub-exponential wrt q G = E(F q ) no sub-exponential algorithm (except for few weak curves) if q = p m, Diem // Gaudry index calculus attack
92 Adaptation of index calculus (Gaudry//Diem) Algorithm Input : P, Q E(F q n) Output : x such that Q = [x]p 1 Factor base : F = {(x, y) E(F q n) x F q } 2 Compute relations : [a j ]P [b j ]Q = P 1 P n, P i F ( proba = 1 ) n! until having #F + 1 such relations 3 Linear algebra j [λ j a j ]P [λ j b j ]Q = 0 E(Fq n )
93 Adaptation of index calculus (Gaudry//Diem) Algorithm Input : P, Q E(F q n) Output : x such that Q = [x]p 1 Factor base : F = {(x, y) E(F q n) x F q } 2 Compute relations : [a j ]P [b j ]Q = P 1 P n, P i F ( proba = 1 ) n! until having #F + 1 such relations 3 Linear algebra j [λ j a j ]P [λ j b j ]Q = 0 E(Fq n ) Complexity For n fixed, Õ(q2 2 n ) (Gaudry, pprint 2004 and JSC 2009 / Diem, ANTS 2006)
94 Problem : point decomposition (PDP) Given: R E(F q n) F = {(x, y) E(F q n) x F q } E(F q n) find P 1,, P n F such that R = P 1 P n Algebraic method Modeling the problem as a polynomial system {g 1,, g s } and solve this system
95 Related work [Joux, Vitse eprintiacrorg/2010/157] General approach Similar to hybrid approach (specialization of one point) decrease the cost of solving the algebraic system add an exhaustive search on F of size q In practice: limits the size of F q, q 2 30 Goal (joint work with L Huot and G Renault) Focus on Edwards curves Take advantage of the symmetries to decrease the cost of solving system (in comparison to Gaudry) No exhaustive search, complexity linear wrt log(q) for n fixed, (almost) no limit on q
96 Curve representations Weierstrass E : y 2 = x 3 + a x + b P = (x, y) E, P = (x, y) Twisted Edwards Edwards, Bulletin of the AMS 2007 Bernstein et al, AFRICACRYPT 2008 E a,d : a x 2 + y 2 = 1 + d x 2 y 2 where ad(a d) 0 P = (x, y) E a,d, P = ( x, y)
97 Summation polynomials in Weierstrass representation [Semaev, Technical report 2004] Projection of point decomposition problem f m (x 1,, x m ) = g 1,, g s F q n[x 1,, x m ] m 2 m th summation polynomial is defined by (x 1,, x m ) K m, f m (x 1,, x m ) = 0 (y 1,, y m ) K m st i, P i = (x i, y i ) E and P 1 P m = 0 E(K) Properties m > 2, f m is symmetric f n+1 (x 1,, x n, x R ) f n+1 (e 1,, e n ) If E is defined by a Weierstrass equation then deg xi (f m ) = 2 m 2
98 Summation polynomials for twisted Edwards curves We need to fix a small technical Issue: For all P = (x, y) E a,d we have P = ( x, y) P 1 P m = 0 Ea,d f m (x 1,, x m ) = 0 Fq n = ( P 1 ) ( P m ) = 0 Ea,d f m ( x 1,, x m ) = 0 Fq n Degree is too big! deg xi (f m ) = (2 m 2 ) 2 Trick : x y Summation polynomials for Edwards curves : f n+1 (y 1,, y n, y R ) Algorithm adaptation : F = {(x, y) E a,d (F q n) y F q }
99 Use that we are in some extension F q n Up to now we have only one equation: fn+1 (e 1,, e n ) = 0 but { xi F q f n+1 F q n[x 1,, x n ]
100 Use that we are in some extension F q n Up to now we have only one equation: fn+1 (e 1,, e n ) = 0 but { xi F q f n+1 F q n[x 1,, x n ] Weil restriction on summation polynomial F q n : n dimensional F q -vector space ] (0) fn+1 (e 1,, e n ) = 0 Fq n = [ f n+1 (e (n 1) 1,, e n ),, f n+1 (e 1,, e n ) - S = { f (0) n+1 - n variables, n equations - solutions in F q,, f (n 1) n+1 } F q[x 1,, x n ]
101 Semaev modeling: Weierstrass vs twisted Edwards Weierstrass LEX Gröbner Basis of S Sn : e 1 + h 1 (e n ) e 2 + h 2 (e n ) e n 2 + h n 2 (e n ) e n 1 + h n 1 (e n ) h n (e n ) Edwards LEX Gröbner Basis of S Sn : e 1 + h 1 (e n 1, e n ) e 2 + h 2 (e n 1, e n ) e n 2 + h n 2 (e n 1, e n ) h n 1 (e n 1, e n ) h n (e n ) deg(h n ) = 2 n(n 1) deg( S Sn ) = 2 n(n 1) deg(h n ) = 2 (n 1)2 deg en 1 (h n 1 ) = 2 n 1 deg( S Sn ) = 2 n(n 1)
102 Action of 2-torsion point Definition E a,d : ax 2 + y 2 = +dx 2 y 2 has a 2-torsion point T 2 = (0, 1) ie [2]T 2 = 0 Ea,d Property P = (x, y) E a,d (F q n), P T 2 = ( x, y)
103 Action of 2-torsion point Definition E a,d : ax 2 + y 2 = +dx 2 y 2 has a 2-torsion point T 2 = (0, 1) ie [2]T 2 = 0 Ea,d Property P = (x, y) E a,d (F q n), P T 2 = ( x, y) Action on the points (geometry) P 1 P n = R (P 1 T 2 ) (P 2 T 2 ) P 3 P n = R For any combination of an even number of T 2
104 Action of 2-torsion point Definition E a,d : ax 2 + y 2 = +dx 2 y 2 has a 2-torsion point T 2 = (0, 1) ie [2]T 2 = 0 Ea,d Property P = (x, y) E a,d (F q n), P T 2 = ( x, y) Action on the points (geometry) P 1 P n = R (P 1 T 2 ) (P 2 T 2 ) P 3 P n = R (y 1,, y n ) V R ( y 1, y 2, y 3,, y n ) V R For any combination of an even number of T 2 Theorem f n+1 (y 1,, y n, y R ) F q n[y 1,, y n ] Dn fn+1 (e 1,, e n ) ˆf n+1 (E 1,, E n 1, e n ) where E i = e i (y 2 1,, y 2 n )
105 New Semaev modeling: Weierstrass vs Edwards Weierstrass LEX Gröbner Basis of S Sn : e 1 + h 1 (e n ) e 2 + h 2 (e n ) e n 1 + h n 1 (e n ) h n (e n ) Edwards LEX Gröbner Basis of S Dn : E 1 + h 1 (e n ) E 2 + h 2 (e n ) E n 1 + h n 1 (e n ) h n (e n ) deg(h n ) = 2 n(n 1) deg(h n ) = 2 (n 1)2 new system such that deg( S Dn ) = deg( S ) #D n = deg( S S n ) 2 n 1 Much faster Gröbner basis computation Complexity of FGLM 2 ω(n 1) using the action of T 2
106 Some practical results #F q : 16 bits n DRL LEX Total Time Deg Time Time # ops W sym 6s s 466s FGb Edwards D n s 3s W sym FGb Edwards D n 12297s s 15953s 2 45 n = 4 #F q (bits) Total time (s) W sym 6922s 4717s 5837s 6898s Magma Edwards D n 43s 40s 53s 73s
107 Security domains parameters n log 2 (q) #E(F q n) Gen Algo DLPV Edwards W Edwards W Edwards W Edwards W ?? Edwards W 2?? Number of Boolean operations needed to solve the ECDLP defined over F q n for n = 4, 5 and 32 log 2 (q) 128
108 Conclusion Summary for DLP Edwards + Jacobi Intersections : action of 2-torsion point New change of variables symmetric group + 2-torsion point Practical improvements huge factor save to solve the systems decomposition in 5 points solved complexity of point decomposition problem linear wrt log(q) for n 5 Conclusion Use the structure can speedup Algebraic Attack Sometimes change the complexity of the attack Many Open Issues: Symmetries, Multihomogeneous, Sparse equations,
Résolution de systèmes polynomiaux structurés et applications en Cryptologie
Résolution de systèmes polynomiaux structurés et applications en Cryptologie Pierre-Jean Spaenlehauer University of Western Ontario Ontario Research Center for Computer Algebra Magali Bardet, Jean-Charles
More informationA variant of the F4 algorithm
A variant of the F4 algorithm Vanessa VITSE - Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire PRISM CT-RSA, February 18, 2011 Motivation Motivation An example of algebraic cryptanalysis
More informationElliptic Curve Discrete Logarithm Problem
Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October
More informationHybrid Approach : a Tool for Multivariate Cryptography
Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationGröbner Bases. Applications in Cryptology
Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS with partial support of Celar/DGA FSE 20007 - Luxembourg E cient Goal: how Gröbner bases can be used to break
More informationOn the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems
On the Complexity of Gröbner Basis Computation for Regular and Semi-Regular Systems Bruno.Salvy@inria.fr Algorithms Project, Inria Joint work with Magali Bardet & Jean-Charles Faugère September 21st, 2006
More informationGröbner Bases in Public-Key Cryptography
Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis
More informationA Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae PKC 2015, March 30 - April 1, Maryland, USA 2 Summary
More informationCover and Decomposition Index Calculus on Elliptic Curves made practical
Cover and Decomposition Index Calculus on Elliptic Curves made practical Application to a previously unreachable curve over F p 6 Vanessa VITSE Antoine JOUX Université de Versailles Saint-Quentin, Laboratoire
More informationGröbner Bases Techniques in Post-Quantum Cryptography
Gröbner Bases Techniques in Post-Quantum Cryptography Ludovic Perret Sorbonne Universités, UPMC Univ Paris 06, INRIA Paris LIP6, PolSyS Project, Paris, France Post-Quantum Cryptography Winter School, Fukuoka,
More informationComparison between XL and Gröbner Basis Algorithms
Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042
More informationCalcul d indice et courbes algébriques : de meilleures récoltes
Calcul d indice et courbes algébriques : de meilleures récoltes Alexandre Wallet ENS de Lyon, Laboratoire LIP, Equipe AriC Alexandre Wallet De meilleures récoltes dans le calcul d indice 1 / 35 Today:
More informationMultivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar?
Multivariate Public Key Cryptography or Why is there a rainbow hidden behind fields full of oil and vinegar? Christian Eder, Jean-Charles Faugère and Ludovic Perret Seminar on Fundamental Algorithms, University
More informationThe point decomposition problem in Jacobian varieties
The point decomposition problem in Jacobian varieties Jean-Charles Faugère2, Alexandre Wallet1,2 1 2 ENS Lyon, Laboratoire LIP, Equipe AriC UPMC Univ Paris 96, CNRS, INRIA, LIP6, Equipe PolSys 1 / 19 1
More informationProblème du logarithme discret sur courbes elliptiques
Problème du logarithme discret sur courbes elliptiques Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM Groupe de travail équipe ARITH LIRMM Vanessa VITSE (UVSQ) DLP over elliptic
More informationAlgebraic Cryptanalysis of Curry and Flurry using Correlated Messages
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Jean-Charles Faugère and Ludovic Perret SALSA Project INRIA, Centre Paris-Rocquencourt UPMC, Univ Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationSummation polynomial algorithms for elliptic curves in characteristic two
Summation polynomial algorithms for elliptic curves in characteristic two Steven D. Galbraith and Shishay W. Gebregiyorgis Mathematics Department, University of Auckland, New Zealand. S.Galbraith@math.auckland.ac.nz,sgeb522@aucklanduni.ac.nz
More informationAlgebraic Aspects of Symmetric-key Cryptography
Algebraic Aspects of Symmetric-key Cryptography Carlos Cid (carlos.cid@rhul.ac.uk) Information Security Group Royal Holloway, University of London 04.May.2007 ECRYPT Summer School 1 Algebraic Techniques
More informationReconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems
Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems Chenqi Mou Wei Niu LMIB-School of Mathematics École Centrale Pékin and Systems Science Beihang University, Beijing 100191,
More informationON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS
ON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS STAVROS KOUSIDIS AND ANDREAS WIEMERS Abstract We improve on the first fall degree bound of polynomial systems that arise from a Weil descent along Semaev
More informationA (short) survey on signature-based Gröbner Basis Algorithms
A (short) survey on signature-based Gröbner Basis Algorithms Christian Eder, Jean-Charles Faugère, John Perry and Bjarke Hammersholt Roune ACA 2014, New York, US July 10, 2014 1 / 16 How to detect zero
More informationarxiv: v1 [cs.cr] 6 Apr 2015
New algorithm for the discrete logarithm problem on elliptic curves arxiv:1504.01175v1 [cs.cr] 6 Apr 2015 Igor Semaev Department of Informatics University of Bergen, Norway e-mail: igor@ii.uib.no phone:
More informationThe F 4 Algorithm. Dylan Peifer. 9 May Cornell University
The F 4 Algorithm Dylan Peifer Cornell University 9 May 2017 Gröbner Bases History Gröbner bases were introduced in 1965 in the PhD thesis of Bruno Buchberger under Wolfgang Gröbner. Buchberger s algorithm
More informationNon-generic attacks on elliptic curve DLPs
Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC Summer School Leuven, September 13 2013 Smith
More informationarxiv: v3 [cs.sc] 3 May 2013
On the Complexity of Computing Gröbner Bases for Quasi-Homogeneous Systems arxiv:1301.5612v3 [cs.sc] 3 May 2013 Jean-Charles Faugère * Jean-Charles.Faugere@inria.fr ABSTRACT Mohab Safey El Din * Mohab.Safey@lip6.fr
More informationGröbner Bases. Applications in Cryptology
Gröbner - Crypto J.-C. Faugère Plan Gröbner bases: properties Gröbner Bases. Applications in Cryptology Jean-Charles Faugère INRIA, Université Paris 6, CNRS Zero dim solve Algorithms Buchberger and Macaulay
More informationA variant of the F4 algorithm
A variant of the F4 algorithm Antoine Joux 1,2 and Vanessa Vitse 2 1 Direction Générale de l Armement (DGA) 2 Université de Versailles Saint-Quentin, Laboratoire PRISM, 45 av. des États-Unis, 78035 Versailles
More informationOn the Complexity of the Generalized MinRank Problem
On the Complexity of the Generalized MinRank Problem Jean-Charles Faugère a Mohab Safey El Din a Pierre-Jean Spaenlehauer b,a, a Université Paris 6, INRIA Paris-Rocquencourt, PolSys Project, CNRS, UMR
More informationCurrent Advances. Open Source Gröbner Basis Algorithms
Current Advances in Open Source Gröbner Basis Algorithms My name is Christian Eder I am from the University of Kaiserslautern 3 years ago Christian Eder, Jean-Charles Faugère A survey on signature-based
More informationADVANCED TOPICS IN ALGEBRAIC GEOMETRY
ADVANCED TOPICS IN ALGEBRAIC GEOMETRY DAVID WHITE Outline of talk: My goal is to introduce a few more advanced topics in algebraic geometry but not to go into too much detail. This will be a survey of
More informationA variant of the F4 algorithm
A variant of the F4 algorithm Antoine Joux 1,2 and Vanessa Vitse 2 1 Direction Générale de l Armement (DGA) 2 Université de Versailles Saint-Quentin, Laboratoire PRISM, 45 av. des États-Unis, 78035 Versailles
More informationAlgebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis
Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre
More informationNew Directions in Multivariate Public Key Cryptography
New Directions in Shuhong Gao Joint with Ray Heindl Clemson University The 4th International Workshop on Finite Fields and Applications Beijing University, May 28-30, 2010. 1 Public Key Cryptography in
More informationGroebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics
Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics Tan Tran Junior Major-Economics& Mathematics History Groebner bases were developed by Buchberger in 1965, who later named
More informationAlgebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case
1 / 27 Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case Marta Conde Pena 1 Jean-Charles Faugère 2,3,4 Ludovic Perret 3,2,4 1 Spanish National Research Council (CSIC) 2 Sorbonne Universités,
More informationPolynomials, Ideals, and Gröbner Bases
Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields
More informationThe point decomposition problem in Jacobian varieties
The point decomposition problem in Jacobian varieties Alexandre Wallet ENS Lyon, Laboratoire LIP, Equipe AriC 1 / 38 1 Generalities Discrete Logarithm Problem Short State-of-the-Art for curves About Index-Calculus
More informationHyperelliptic curves
1/40 Hyperelliptic curves Pierrick Gaudry Caramel LORIA CNRS, Université de Lorraine, Inria ECC Summer School 2013, Leuven 2/40 Plan What? Why? Group law: the Jacobian Cardinalities, torsion Hyperelliptic
More informationWORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE
WORKING WITH MULTIVARIATE POLYNOMIALS IN MAPLE JEFFREY B. FARR AND ROMAN PEARCE Abstract. We comment on the implementation of various algorithms in multivariate polynomial theory. Specifically, we describe
More informationAnalysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields
Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 278-283 Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields N. G. Kuzmina and E. B. Makhovenko Saint-Petersburg
More informationOn Polynomial Systems Arising from a Weil Descent
On Polynomial Systems Arising from a Weil Descent Christophe Petit and Jean-Jacques Quisquater UCL Crypto Group, Université catholique de Louvain Place du Levant 3 1348 Louvain-la-Neuve (Belgium) christophe.petit@uclouvain.be,
More informationLittle Dragon Two: An efficient Multivariate Public Key Cryptosystem
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India October
More informationUnderstanding and Implementing F5
Understanding and Implementing F5 John Perry john.perry@usm.edu University of Southern Mississippi Understanding and Implementing F5 p.1 Overview Understanding F5 Description Criteria Proofs Implementing
More informationOn the Complexity of the Hybrid Approach on HFEv-
On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature
More informationNew candidates for multivariate trapdoor functions
New candidates for multivariate trapdoor functions Jaiberth Porras 1, John B. Baena 1, Jintai Ding 2,B 1 Universidad Nacional de Colombia, Medellín, Colombia 2 University of Cincinnati, Cincinnati, OH,
More informationImproved Cryptanalysis of HFEv- via Projection
Improved Cryptanalysis of HFEv- via Projection Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone PQ Crypto 2018 Fort Lauderdale, Florida 04/10/2018 A. Petzoldt Cryptanalysis of HFEv- via Projection
More informationRounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences J. Bi, J-S. Coron, J-C. Faugère, P. Nguyen, G. Renault, R. Zeitoun Public Key Cryptography 2014 26-28 March, 2014
More informationComputing Minimal Polynomial of Matrices over Algebraic Extension Fields
Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this
More informationSummation polynomials and the discrete logarithm problem on elliptic curves
Summation polynomials and the discrete logarithm problem on elliptic curves Igor Semaev Department of Mathematics University of Leuven,Celestijnenlaan 200B 3001 Heverlee,Belgium Igor.Semaev@wis.kuleuven.ac.be
More informationarxiv: v1 [cs.cr] 6 Jan 2013
On the complexity of the Rank Syndrome Decoding problem P. Gaborit 1, O. Ruatta 1 and J. Schrek 1 Université de Limoges, XLIM-DMI, 123, Av. Albert Thomas 87060 Limoges Cedex, France. philippe.gaborit,julien.schrek,olivier.ruatta@unilim.fr
More informationElliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields Application to the static Diffie-Hellman problem on E(F q 5) Antoine Joux 1 and Vanessa Vitse 2 1 DGA and Université de Versailles
More informationAlgebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis
Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre
More informationComputing Rational Points in Convex Semi-algebraic Sets and Sums-of-Squares Decompositions
Computing Rational Points in Convex Semi-algebraic Sets and Sums-of-Squares Decompositions Mohab Safey El Din 1 Lihong Zhi 2 1 University Pierre et Marie Curie, Paris 6, France INRIA Paris-Rocquencourt,
More informationCHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux
CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S Ant nine J aux (g) CRC Press Taylor 8* Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor &
More informationHILBERT FUNCTIONS. 1. Introduction
HILBERT FUCTIOS JORDA SCHETTLER 1. Introduction A Hilbert function (so far as we will discuss) is a map from the nonnegative integers to themselves which records the lengths of composition series of each
More informationVirtual isomorphisms of ciphers: is AES secure against differential / linear attack?
Alexander Rostovtsev alexander. rostovtsev@ibks.ftk.spbstu.ru St. Petersburg State Polytechnic University Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? In [eprint.iacr.org/2009/117]
More informationPolynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes
Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Roberta Barbi December 17, 2015 Roberta Barbi List decoding December 17, 2015 1 / 13 Codes Let F q be
More informationSignature-based Gröbner basis computation
Signature-based Gröbner basis computation Christian Eder POLSYS Team, UPMC, Paris, France March 08, 2013 1 / 22 1 The basic problem 2 Generic signature-based algorithms The basic idea Generic signature-based
More informationIsomorphism of Polynomials : New Results
Isomorphism of Polynomials : New Results Charles Bouillaguet, Jean-Charles Faugère 2,3, Pierre-Alain Fouque and Ludovic Perret 3,2 Ecole Normale Supérieure {charles.bouillaguet, pierre-alain.fouque}@ens.fr
More informationMultivariate Public Key Cryptography
Winter School, PQC 2016, Fukuoka Multivariate Public Key Cryptography Jintai Ding University of Cincinnati Feb. 22 2016 Outline Outline What is a MPKC? Multivariate Public Key Cryptosystems - Cryptosystems,
More informationHidden Field Equations
Security of Hidden Field Equations (HFE) 1 The security of Hidden Field Equations ( H F E ) Nicolas T. Courtois INRIA, Paris 6 and Toulon University courtois@minrank.org Permanent HFE web page : hfe.minrank.org
More informationOn the Existence of Semi-Regular Sequences
On the Existence of Semi-Regular Sequences Sergio Molina 1 joint work with T. J. Hodges 1 J. Schlather 1 Department of Mathematics University of Cincinnati DIMACS, January 2015 Sergio Molina (UC) Semi-Regular
More informationKey Recovery on Hidden Monomial Multivariate Schemes
Key Recovery on Hidden Monomial Multivariate Schemes Pierre-Alain Fouque 1, Gilles Macario-Rat 2, and Jacques Stern 1 1 École normale supérieure, 45 rue d Ulm, 75005 Paris, France {Pierre-Alain.Fouque,
More informationDiophantine equations via weighted LLL algorithm
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL algorithm Momonari Kudo Graduate School of Mathematics, Kyushu University, JAPAN Kyushu University Number Theory
More informationSome D-module theoretic aspects of the local cohomology of a polynomial ring
Some D-module theoretic aspects of the local cohomology of a polynomial ring Toshinori Oaku Tokyo Woman s Christian University July 6, 2015, MSJ-SI in Osaka Toshinori Oaku (Tokyo Woman s Christian University)
More informationNew Gröbner Bases for formal verification and cryptography
New Gröbner Bases for formal verification and cryptography Gert-Martin Greuel Diamant/Eidma Symposium November 29th - November 30th November 29th, 2007 Introduction Focus of this talk New developements
More informationAlgorithms for the Elliptic Curve Discrete Logarithm and the Approximate Common Divisor Problem. Shishay Welay Gebregiyorgis
Algorithms for the Elliptic Curve Discrete Logarithm and the Approximate Common Divisor Problem Shishay Welay Gebregiyorgis A Thesis Submitted in Fulfillment of the Requirements for the Degree of Doctor
More informationCurves, Cryptography, and Primes of the Form x 2 + y 2 D
Curves, Cryptography, and Primes of the Form x + y D Juliana V. Belding Abstract An ongoing challenge in cryptography is to find groups in which the discrete log problem hard, or computationally infeasible.
More informationKac-Moody Algebras. Ana Ros Camacho June 28, 2010
Kac-Moody Algebras Ana Ros Camacho June 28, 2010 Abstract Talk for the seminar on Cohomology of Lie algebras, under the supervision of J-Prof. Christoph Wockel Contents 1 Motivation 1 2 Prerequisites 1
More informationImproved Cryptanalysis of HFEv- via Projection
Improved Cryptanalysis of HFEv- via Projection Jintai Ding 1, Ray Perlner 2, Albrecht Petzoldt 2, and Daniel Smith-Tone 2,3 1 Department of Mathematical Sciences, University of Cincinnati, Cincinnati,
More informationHigh-speed cryptography, part 3: more cryptosystems. Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven
High-speed cryptography, part 3: more cryptosystems Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven Cryptographers Working systems Cryptanalytic algorithm designers
More informationImproving NFS for the discrete logarithm problem in non-prime nite elds
Improving NFS for the discrete logarithm problem in non-prime nite elds Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, Francois Morain Institut national de recherche en informatique et en automatique
More informationMultivariate Quadratic Public-Key Cryptography Part 1: Basics
Multivariate Quadratic Public-Key Cryptography Part 1: Basics Bo-Yin Yang Academia Sinica PQCrypto Executive Summer School 2017 Eindhoven, the Netherlands Friday, 23.06.2017 B.-Y. Yang (Academia Sinica)
More informationLocalization. Introduction. Markus Lange-Hegermann
Localization Markus Lange-Hegermann Introduction This talk deals with localisation of holonomic Weyl algebra modules and their localisation. Consider left modules an d left ideals for this talk. Instead
More informationTOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen and Shaohua Tang School of Computer Science & Engineering, South China University of Technology, Guangzhou 510006,
More informationPoly Dragon: An efficient Multivariate Public Key Cryptosystem
Poly Dragon: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India May 19, 2010
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 13 March 3, 2013 CPSC 467b, Lecture 13 1/52 Elliptic Curves Basics Elliptic Curve Cryptography CPSC
More informationCryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction Shinya Okumura Institute of Systems, Information Technologies and Nanotechnologies This is a joint work
More informationAlgebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,
More informationThe Decisional Diffie-Hellman Problem and the Uniform Boundedness Theorem
The Decisional Diffie-Hellman Problem and the Uniform Boundedness Theorem Qi Cheng and Shigenori Uchiyama April 22, 2003 Abstract In this paper, we propose an algorithm to solve the Decisional Diffie-Hellman
More informationAn overview of D-modules: holonomic D-modules, b-functions, and V -filtrations
An overview of D-modules: holonomic D-modules, b-functions, and V -filtrations Mircea Mustaţă University of Michigan Mainz July 9, 2018 Mircea Mustaţă () An overview of D-modules Mainz July 9, 2018 1 The
More informationLecture 15: Algebraic Geometry II
6.859/15.083 Integer Programming and Combinatorial Optimization Fall 009 Today... Ideals in k[x] Properties of Gröbner bases Buchberger s algorithm Elimination theory The Weak Nullstellensatz 0/1-Integer
More informationA normal form for elliptic curves in characteristic 2
A normal form for elliptic curves in characteristic 2 David R. Kohel Institut de Mathématiques de Luminy Arithmetic, Geometry, Cryptography et Coding Theory 2011 CIRM, Luminy, 15 March 2011 Edwards model
More informationRegularisation of Gröbner basis computations for weighted and determinantal systems, and application to medical imagery
Regularisation of Gröbner basis computations for weighted and determinantal systems, and application to medical imagery Thibaut Verron To cite this version: Thibaut Verron. Regularisation of Gröbner basis
More informationOutline of the Seminar Topics on elliptic curves Saarbrücken,
Outline of the Seminar Topics on elliptic curves Saarbrücken, 11.09.2017 Contents A Number theory and algebraic geometry 2 B Elliptic curves 2 1 Rational points on elliptic curves (Mordell s Theorem) 5
More informationConstructing genus 2 curves over finite fields
Constructing genus 2 curves over finite fields Kirsten Eisenträger The Pennsylvania State University Fq12, Saratoga Springs July 15, 2015 1 / 34 Curves and cryptography RSA: most widely used public key
More informationSimple Matrix Scheme for Encryption (ABC)
Simple Matrix Scheme for Encryption (ABC) Adama Diene, Chengdong Tao, Jintai Ding April 26, 2013 dama Diene, Chengdong Tao, Jintai Ding ()Simple Matrix Scheme for Encryption (ABC) April 26, 2013 1 / 31
More informationLecture 1. (i,j) N 2 kx i y j, and this makes k[x, y]
Lecture 1 1. Polynomial Rings, Gröbner Bases Definition 1.1. Let R be a ring, G an abelian semigroup, and R = i G R i a direct sum decomposition of abelian groups. R is graded (G-graded) if R i R j R i+j
More informationMCS 563 Spring 2014 Analytic Symbolic Computation Monday 27 January. Gröbner bases
Gröbner bases In this lecture we introduce Buchberger s algorithm to compute a Gröbner basis for an ideal, following [2]. We sketch an application in filter design. Showing the termination of Buchberger
More informationFirst we introduce the sets that are going to serve as the generalizations of the scalars.
Contents 1 Fields...................................... 2 2 Vector spaces.................................. 4 3 Matrices..................................... 7 4 Linear systems and matrices..........................
More informationElementary linear algebra
Chapter 1 Elementary linear algebra 1.1 Vector spaces Vector spaces owe their importance to the fact that so many models arising in the solutions of specific problems turn out to be vector spaces. The
More informationCOMPRESSION FOR TRACE ZERO SUBGROUPS OF ELLIPTIC CURVES
COMPRESSION FOR TRACE ZERO SUBGROUPS OF ELLIPTIC CURVES A. SILVERBERG Abstract. We give details of a compression/decompression algorithm for points in trace zero subgroups of elliptic curves over F q r,
More informationA method for construction of Lie group invariants
arxiv:1206.4395v1 [math.rt] 20 Jun 2012 A method for construction of Lie group invariants Yu. Palii Laboratory of Information Technologies, Joint Institute for Nuclear Research, Dubna, Russia and Institute
More informationA new attack on RSA with a composed decryption exponent
A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj and Mohamed Ould Douh,2 Laboratoire de Mathématiques Nicolas Oresme Université de Caen, Basse Normandie, France abderrahmane.nitaj@unicaen.fr
More informationREGULARITY AND ALGEBRAIC PROPERTIES OF CERTAIN LATTICE IDEALS JORGE NEVES, MARIA VAZ PINTO, AND RAFAEL H. VILLARREAL
REGULARITY AND ALGEBRAIC PROPERTIES OF CERTAIN LATTICE IDEALS JORGE NEVES, MARIA VAZ PINTO, AND RAFAEL H. VILLARREAL Dedicated to Professor Aron Simis on the occasion of his 70th birthday Abstract. We
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer 1 Lecture 13 October 16, 2017 (notes revised 10/23/17) 1 Derived from lecture notes by Ewa Syta. CPSC 467, Lecture 13 1/57 Elliptic Curves
More informationModern Number Theory: Rank of Elliptic Curves
Modern Number Theory: Rank of Elliptic Curves Department of Mathematics University of California, Irvine October 24, 2007 Rank of Outline 1 Introduction Basics Algebraic Structure 2 The Problem Relation
More informationMappings of elliptic curves
Mappings of elliptic curves Benjamin Smith INRIA Saclay Île-de-France & Laboratoire d Informatique de l École polytechnique (LIX) Eindhoven, September 2008 Smith (INRIA & LIX) Isogenies of Elliptic Curves
More informationOpen problems related to algebraic attacks on stream ciphers
Open problems related to algebraic attacks on stream ciphers Anne Canteaut INRIA - projet CODES B.P. 105 78153 Le Chesnay cedex - France e-mail: Anne.Canteaut@inria.fr Abstract The recently developed algebraic
More informationSolving Underdetermined Systems of Multivariate Quadratic Equations Revisited
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited Enrico Thomae and Christopher Wolf Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum,
More information