Cryptography Reference
In-Depth Information
the extension field
F q n + . This way we can apply the homomorphism
F q n +
: x x q k for k =0 ,..., ( n +
F q n +
1) within the extension field. Finally, this
is used to construct a matrix M n + .
... θ q n + 1
1
θ 1
θ 1
θ 2 ... θ q n + 1
θ 2
2
. . . . .
θ n + θ n + ... θ q n + 1
M n + :=
n +
n +
q
More precisely, for a vector v := ( v 1 ,...,v n + l )
F
we have the mapping φ :
n +
q
F
F q n +
with
φ ( v )
V 1 :( v 1 ,...,v n + ) M n + =: ( V 1 ,...,V n + ) .
Note that this mapping only uses the first component of the vector ( V 1 ,...,V n + ).
Moreover, the first column of M n + consists only of base elements of
n +
q
F
. Hence,
V 1 F q n
n
q
are the same. The inverse mapping needs to make use of the special struc-
ture of the matrix M n + to map elements back into the ground field. We have
φ 1 :
two values V 1 ,
will only be equal if the corresponding vectors v, v F
n +
q
F q n +
F
for
( v 1 ,...,v n + ):( V, V q ,...,V q n + 1 ) M 1
φ 1 ( V )
n + =: ( v 1 ,...,v n + ) .
Using the matrix M n + , we can now go back and forth between the two vec-
tor spaces
n +
q n + (extension field). The latter is a very
redundant version of the former as we could use any component of the vector
V =( V, V q ,...,V q n + 1 ) to reconstruct all other ( n +
n +
q
F
(ground field) and
F
1) elements. However,
we will see below how it will help us to express the rank condition on
F
using
only publicly available information.
There are two minor ingredients missing before we can formulate the full
attack. The first is the quadratic form of the plus polynomials a 1 ,...,a p .Asfor
Double-Layer Square, we write them as symmetric matrices A ( i )
( n + )
×
( n + )
F
q
with x =( x 1 ,...,x n + )and a i = xA ( i ) x for 1
i
p . Hence, we work over
( n + ) × ( n + )
q n +
( i )
the ground field here. Second, we define matrices
F
F
similar
( i )
k,k
( i )
a,b
to
F
from above as
F
:= 1 but
F
=0for k := (1
i )(mod n + )+1,
1
a, b k . Or to rephrase this, we have the all-zero matrix with the a single
1, the matrix
(1)
,andthe1is
traveling backwards on the main diagonal for each consecutive matrix
F
coincides with the originally defined matrix
F
( i ) .Note
F
( k ) M n +
that evaluating M n + F
yields exactly X 2 for each matrix
F
( k ) .
We now express the private key in terms of S, T, A, F
and study their corre-
sponding ranks
P = T
F
S
=(
C◦ S, A◦ S ) T
Search WWH ::




Custom Search