Skip to main content
Log in

A ciphertext-only attack on Polly Two

  • Published:
Applicable Algebra in Engineering, Communication and Computing Aims and scope

Abstract

Polly Two is a public key encryption scheme that builds on the conceptual public key encryption scheme Polly Cracker. We describe a heuristic attack on Polly Two, which aims at recovering the plaintext from a given ciphertext without revealing the secret key. The attack has been applied successfully to solve the latest “Polly Two challenge”.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Bosma W., Cannon J., Playoust C.: The Magma Algebra System I: The User Language. J. Symb. Comput. 24, 235–265 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  2. Fellows M., Koblitz N.: Combinatorial cryptosystems galore!. In: Mullen, G.L., Shiue, P.J.S. (eds) Finite Fields: Theory, Applications, and Algorithms, vol. 168 of Comtemporary Mathematics, pp. 51–61. American Mathematical Society, Providence (1994)

    Google Scholar 

  3. Grassl, M., Steinwandt, R.: Email communication with Le Van Ly, August 2004

  4. Hofheinz, D., Steinwandt, R.: A “differential” attack on Polly cracker. In: 2002 IEEE International Symposium on Information Theory, ISIT 2002 Proceedings, pp. 211 (2002) (Extended abstract)

  5. Koblitz N.: Algebraic aspects of cryptography. With an appendix on hyperelliptic curves. In: Menezes, A.J., Wu, Y.-H., Zuccherato, R.J.(eds) Algorithms and Computation in Mathematics, vol. 3, Springer, Berlin (1998)

  6. Steinwandt R., Geiselmann W.: Cryptanalysis of Polly cracker. IEEE Trans. Inform. Theory 48(11), 2990–2991 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  7. Van Ly, L.: Email communication, September 2005

  8. Van Ly, L.: Polly Two—a Public-Key cryptosystem based on Polly cracker. PhD thesis, Ruhr-Universität Bochum, Germany, October 2002. Available at http://www-brs.ub.ruhr-uni-bochum.de/netahtml/HSS/Diss/LyLeVan/diss.pdf

  9. Van Ly L.: Polly Two: a new algebraic polynomial-based Public-Key scheme. Appl. Algebra Eng. Commun. Comput. 17(3–4), 267–283 (2006)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rainer Steinwandt.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Steinwandt, R. A ciphertext-only attack on Polly Two. AAECC 21, 85–92 (2010). https://doi.org/10.1007/s00200-009-0114-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00200-009-0114-4

Keywords