Abstract
Polly Two is a public key encryption scheme that builds on the conceptual public key encryption scheme Polly Cracker. We describe a heuristic attack on Polly Two, which aims at recovering the plaintext from a given ciphertext without revealing the secret key. The attack has been applied successfully to solve the latest “Polly Two challenge”.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bosma W., Cannon J., Playoust C.: The Magma Algebra System I: The User Language. J. Symb. Comput. 24, 235–265 (1997)
Fellows M., Koblitz N.: Combinatorial cryptosystems galore!. In: Mullen, G.L., Shiue, P.J.S. (eds) Finite Fields: Theory, Applications, and Algorithms, vol. 168 of Comtemporary Mathematics, pp. 51–61. American Mathematical Society, Providence (1994)
Grassl, M., Steinwandt, R.: Email communication with Le Van Ly, August 2004
Hofheinz, D., Steinwandt, R.: A “differential” attack on Polly cracker. In: 2002 IEEE International Symposium on Information Theory, ISIT 2002 Proceedings, pp. 211 (2002) (Extended abstract)
Koblitz N.: Algebraic aspects of cryptography. With an appendix on hyperelliptic curves. In: Menezes, A.J., Wu, Y.-H., Zuccherato, R.J.(eds) Algorithms and Computation in Mathematics, vol. 3, Springer, Berlin (1998)
Steinwandt R., Geiselmann W.: Cryptanalysis of Polly cracker. IEEE Trans. Inform. Theory 48(11), 2990–2991 (2002)
Van Ly, L.: Email communication, September 2005
Van Ly, L.: Polly Two—a Public-Key cryptosystem based on Polly cracker. PhD thesis, Ruhr-Universität Bochum, Germany, October 2002. Available at http://www-brs.ub.ruhr-uni-bochum.de/netahtml/HSS/Diss/LyLeVan/diss.pdf
Van Ly L.: Polly Two: a new algebraic polynomial-based Public-Key scheme. Appl. Algebra Eng. Commun. Comput. 17(3–4), 267–283 (2006)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Steinwandt, R. A ciphertext-only attack on Polly Two. AAECC 21, 85–92 (2010). https://doi.org/10.1007/s00200-009-0114-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00200-009-0114-4