skip to main content
10.1145/1576702.1576755acmconferencesArticle/Chapter ViewAbstractPublication PagesissacConference Proceedingsconference-collections
tutorial

Interactions between computer algebra (Gröbner bases) and cryptology

Published:28 July 2009Publication History

ABSTRACT

The associated talk surveys how computer algebra techniques have been used to break several cryptosystems.

References

  1. L. Goubin, and J. Patarin. Asymmetric Cryptography with S-Boxes. Information and Communication Security, First International Conference (ICICS'97), Lecture Notes in Computer Science vol. 1334, Springer-Verlag, pp. 369--380, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. F. Ye, K. Y. Lam, Z. D. Dai. Cryptanalysis of "2R" Schemes, Adv in Cryptology - CRYPTO 1999, Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, pp. 315--325, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. F. Ye, Z. D. Dai and K. Y. Lam. Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions, Journal of Cryptology (14), pp. 137--150, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Albrecht, and C. Cid. Algebraic Techniques in Differential Cryptanalysis. Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008, Beijing, China, April 2008.Google ScholarGoogle Scholar
  5. G. Ars. Applications des bases de Gröbner à la cryptographie. Thèse de doctorat, Université de Rennes I, 2004.Google ScholarGoogle Scholar
  6. M. Bardet, J-C. Faugère, B. Salvy and B.-Y. Yang. Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems. In Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, 2005.Google ScholarGoogle Scholar
  7. A. Bauer, and A. Joux. Toward a rigorous variation of coppersmith's algorithm on three variables. Advances in Cryptology - EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4515, Springer-Verlag, pp. 361--378, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Bettale and J. C. Faugère and L. Perret. Cryptanalysis of the TRMS Cryptosystem of PKC 05 AfricaCrypt 2008, Lecture Notes in Computer Science, vol. 5023, Springer-Verlag, pp. 143--155, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Bettale and J. C. Faugère and L. Perret. Security Analysis of Multivariate Polynomials for Hashing. Information Security and Cryptology - Inscrypt 2008, Springer-Verlag, 2008.Google ScholarGoogle Scholar
  10. C. Bouillaguet, and P.-A. Fouque. Analysis of the Collision Resistance of Radio Gatün using Algebraic Techniques. SAC 2008, LNCS, Springer-Verlag. To appear.Google ScholarGoogle Scholar
  11. B. Buchberger. An Algorithm for Finding the Basis Elements in the Residue Class Ring Modulo a Zero Dimensional Polynomial Ideal (German), PhD Thesis, Univ of Innsbruck, Math. Institute, Austria, 1965. (English Translation: J. of Symbolic Computation, Special Issue on Logic, Math and Comp Science: Interactions. Volume 41, Num. 3-4, pp 475--511, 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Buchmann, A. Pyshkin, and R.-P. Weinmann. Block Ciphers Sensitive to Gröbner Basis Attacks. Topics in Cryptology - CT RSA'06, Lecture Notes in Computer Science, vol. 3860, Springer-Verlag, pp. 313--331, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Courtois, and J. Pieprzyk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Advances in Cryptology - ASIACRYPT 2002, Lecture Notes in Computer Science, vol. 2501, pp. 267--287, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Advances in Cryptology - CRYPTO 2003, LNCS, vol. 2729, pp. 176--194, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N. Courtois, and W. Meier. Algebraic Attacks on Stream Ciphers with Linear Feedback. Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, vol. 2656, pp. 345--359, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Daemen, V. Rijmen. The Design of Rijndael: The Wide Trail Strategy. Springer-Verlag (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J.-C. Faugère. A New Efficient Algorithm for Computing Gröbner Basis: F4. Journal of Pure and Applied Algebra, vol. 139, pp. 61--68, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  18. J.-C. Faugère. A New Efficient Algorithm for Computing Gröbner Basis without Reduction to Zero: F5. Proceedings of ISSAC, pp. 75--83. ACM press, July 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J.-C. Faugère, and A. Joux. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Gröbner bases. Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, vol. 2729, Springer-Verlag, pp. 44--60, 2003.Google ScholarGoogle Scholar
  20. J.-C. Faugère, and L. Perret. Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. Advances in Cryptology - EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004, pp. 30--47, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J.-C. Faugère, and L. Perret. Cryptanalysis of 2R- Schemes. Advances in Cryptology - CRYPTO 2006, Lecture Notes in Computer Science, vol. 4117, pp. 357--372, 2006.Google ScholarGoogle Scholar
  22. J.-C. Faugère, F. Levy-dit-Vehel, and L. Perret. Cryptanalysis of MinRank. Advances in Cryptology - CRYPTO 2008, Lecture Notes in Computer Science, vol. 5157, pp. 280--296, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. C. Faugère and L. Perret. On the Security of UOV pp. 103--109, Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008, Beijing, China, April 2008.Google ScholarGoogle Scholar
  24. J.-C. Faugère, and L. Perret. An Efficient Algorithm for Decomposing Multivariate Polynomials and its Applications to Cryptography. Special Issue of the Journal of Symbolic Computation on Gröbner Bases Techniques in Cryptography and Coding Theory. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P.-A. Fouque, G. Macariorat, L. Perret and J. Stern. On the Security of the l-IC Signature Scheme. Public Key Cryptography, 14th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2008, Lecture Notes in Computer Science, vol. 4939, pp. 1--17, Springer-Verlag, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. Math. Ann., 261(4):515--534, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  27. R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Dignatures and Public-Key Cryptosystems. Communications of the ACM, 21-2, pp. 120--126, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Sugita, M. Kawazoe, L. Perret, and H. Imai. Algebraic Cryptanalysis of 58-Round SHA-1. Fast Software Encryption, 14th International Workshop, FSE 2007, Lecture Notes in Computer Science, vol. 4593, Springer-Verlag, pp. 349-365, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. P. W. Shor Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer SIAM J.Sci. Statist. Comput., 26 (1484) 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Caboara, F. Caruso, and C. Traverso. Gröbner bases for public key cryptography ISSAC '08, ACM pp 315--324 (Linz/Hagenberg, Austria) 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Interactions between computer algebra (Gröbner bases) and cryptology

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ISSAC '09: Proceedings of the 2009 international symposium on Symbolic and algebraic computation
            July 2009
            402 pages
            ISBN:9781605586090
            DOI:10.1145/1576702

            Copyright © 2009 Copyright is held by the author/owner(s).

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 July 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • tutorial

            Acceptance Rates

            Overall Acceptance Rate395of838submissions,47%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader