Affiliation:
1. Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45221-0025, USA
Abstract
A Tamed Transformation Method (TTM) cryptosystem was proposed by T. T. Moh in 1999. We describe how the first implementation scheme of the TTM system can be defeated. The computational complexity of our attack is 233 computations on the finite field with 28 elements. The cipher of the TTM systems are degree 2 polynomial maps derived from composition of invertible maps of either total degree 2 or linear maps which can be easily calculated and can be easily inverted. To ensure the system to be of degree two, the key construction of the implementation schemes of the TTM systems is a multivariable polynomial Q8(x1,…,xn) and a set of linearly independent quadratic polynomials qi(x1,…,xm), i=1,…,n such that Q8(q1,…,qn) is again a degree 2 polynomials of x1,…,xm. In this paper, we study the first implementation scheme of the TTM systems [6]. We discovered that in this implementation scheme the specific polynomial Q8 can be decomposed further into a factorization in terms of composition. By taking powers of the equality satisfied by the new composition factors, we can actually derive a set of equations, that can produce linear equations satisfied by the plaintext. These linear equations lead us to find a way to defeat this implementation scheme.
Publisher
World Scientific Pub Co Pte Lt
Subject
Applied Mathematics,Algebra and Number Theory
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital signature schemes using non-square matrices or scrap automorphisms;International Journal of Computer Mathematics: Computer Systems Theory;2024-01-31
2. On tameness of Matsumoto-Imai central maps in three variables over the finite field $\mathbb F_2$;Advances in Mathematics of Communications;2016-04
3. Cryptography;Handbook of Finite Fields;2013-06-17
4. Cryptanalysis of the new TTS scheme in CHES 2004;International Journal of Information Security;2006-04-04