Cryptography Reference
In-Depth Information
and each equation Δf l ( x ) be defined similar to equation (1) as
ij x i x j +
i
a ( l )
b ( l )
i
x i + c ( l ) ,
Δf l ( x ):=
1 ≤i≤j≤n
where a ( l )
ij ,b ( l )
k . At this point, the coecients a ( l )
ij ,b ( l )
i ,c ( l ) are unknown.
To find them, substitute the pairs ( x ( l ) ( l ) ) into the above and construct a
system of linear equations of unknowns a ( l )
,c ( l )
i
ij ,b ( l )
,c ( l ) . Since the total number of
i
a ( l )
ij ,b ( l )
,c ( l ) is ( n +1)( n +2) / 2forafixed l , we can solve such equations and find
i
a ( l )
ij ,b ( l )
i ,c ( l ) with ( n +1)( n +2) / 2 pairs of ( x ( l ) ( l ) ). Remark that a univariate
polynomial equation
k n ,
does not always have a solution, and the probability that it has no solutions is
around 0 . 33
G ( X )= Y ( l ) ,where Y ( l )
K is derived from y ( l )
0 . 5 [29] (about 0 . 368
···∼
1 /e for large q, n ). Thus the attacker
G 1 ( Y ( l ) ) in practice.
Next, we explain how to find S and T by ΔF . Assume that the fault changes
α ij to α ij . Then the central map of ΔF is derived from
has to compute more
α ij ) X q i + q j ,
G −G
)( X )=( α ij
(
G
which is similar to
G
( X ) in MI. Since the rank of the coecient matrix of (
,X q n 1 ) t is 2, Kipnis-Shamir's attack
[32,25] (the rank attack) for rank 2 will find (a part of) S and T .
If there is more than one G fault - namely several coe cients are changed -
ΔF ( x ) is no longer the case above and ΔF ( x ) is reduced to a public key of HFE
with a smaller u . For example, when two coe cients are changed, ΔF is a public
key of HFE derived from
)( X ) as a quadratic form of ( X, X q ,
G
···
with two terms. The attacker can then find S and T
by Kipnis-Shamir's attack [32,25] for rank 4 at most, which is much smaller than
the rank of the coecient matrix for
G
of the HFE without the fault. Since, if the
rank is smaller, Kipnis-Shamir's attack recover S and T with less complexity (see
[32,25] for the complexity estimations), our fault attack reduces the complexity
of recovering S and T .
G
3.2.2 Fault Attack on G for STS Type
We propose the fault attack on the STS type, which has a central map given by
(10). Note that, different to the attack on the BF type, we need to cause a fault
in several times for STS type.
First, assume that the coe cient a ( l 1 )
i 1 j 1
is changed to ( a ( l 1 )
i 1 j 1
) by the fault. In
this case, it is easy to see that
l 1 1
0 ,
G )( x )=
, 0 t ,
, 0 , ( a ( l 1 )
( a ( l 1 )
i 1 j 1
) ) x i 1 x j 1 , 0 ,
( G
···
i 1 j 1
···
,x n ) t .Wethenseethat
where x =( x 1 ,
···
l
1 , 0 ,
δ (1) = ΔF ( x (1) )= T 1
G )
S ( x (1) )= cT 1 (0 ,
, 0) t ,
( G
···
, 0 ,
···
Search WWH ::




Custom Search