Cryptography Reference
In-Depth Information
f ( x )+ f (0). The use of this discrete differential appears to occur in very many
cryptanalyses of post-quantum multivariate schemes. In fact, we can even con-
sider Patarin's initial attack, in [11], on Imai and Matsumoto's C scheme, see
[12], as the exploitation of a trivial differential symmetry. Suppose f ( x )= x q θ +1
and let y = f ( x ). Since the differential of f , Df , is a symmetric bilinear func-
tion, 0 = Df ( y, y )= Df ( y, x q θ +1 )= yx q 2 θ + q θ + y q θ x q θ +1 = x q θ ( yx q 2 θ + y q θ x ).
Dividing by x q θ we have Patarin's linear relation, yx q 2 θ = y q θ x ;see[11]for
details.
Differential methods provide powerful tools for decomposing a multivariate
scheme. To illustrate the nearly universal nature of differential attacks, we review
the attack of Kipnis and Shamir, see [9], on a non-big-field system, the oil and
vinegar scheme. Though they use differing terminology, the attack exploits a
symmetry hidden in the differential structure of the scheme.
Recall that the oil and vinegar scheme is based on a hidden quadratic system
of equations, f : k n
The differential of a field map, f , is defined by Df ( a, x )= f ( a + x )
f ( a )
k o ,intwotypesofvariables, x 1 , ..., x o ,theoilvariables,
and x o +1 , ..., x o + v = n , the vinegar variables. We focus on the balanced oil and
vinegar scheme, in which o = v .Let c 1 , ..., c v be random constants. The map f
has the property that f ( x 1 , ..., x v ,c 1 , ..., c v )isanein x 1 , ..., x v . The encryption
map, f is the composition of f with an n -dimensional invertible ane map, L .
Let O represent the subspace generated by the first v basis vectors, and let
V denote the cosummand of O . Notice that the discrete differential given by
Df ( a, x )= f ( x + a )
f ( a )+ f (0) has the property that for all a and x
in O , Df ( a, x ) = 0. Thus for each coordinate, i , the differential coordinate form
Df i can be represented:
f ( x )
Df i = 0 Df i 1
.
Df i 1 Df i 2
Let M 1 and M 2 be two invertible matrices in the span of the Df i .Then M 1
M 2
1
is an O -invariant transformation of the form:
AB
0 C
.
L ) i = L T Df i L ,sothe L T Df i L are
known. Notice that if M is in the span of the Df i ,then L T ML is in the span of
the L T Df i L .Also,since( L T M 1 L ) 1 ( L T M 2 L )= L 1 M 1 M 2 L , there is a large
space of matrices leaving L 1 O invariant, which Kipnis and Shamir are able to
exploit to effect an attack against the balanced oil and vinegar scheme; see [9]
for details. Making the oil and vinegar scheme unbalanced, see [13], corrects this
problem by making any subspace which is invariant under a general product
M 1 M 2 very small, see [14].
While the differential analysis of the oil and vinegar systems is a very spe-
cific case of utilizing an invariant related to the differential structure of the
hidden map, several general attacks on big field schemes rely on a type of linear
Now the Df i
are not known, but D ( f
 
Search WWH ::




Custom Search