Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Advances in Cryptology — CRYPTO’ 99
  3. Conference paper

Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization

  • Conference paper
  • First Online: 16 December 1999
  • pp 19–30
  • Cite this conference paper
Advances in Cryptology — CRYPTO’ 99 (CRYPTO 1999)
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization
  • Aviad Kipnis5 &
  • Adi Shamir6 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1666))

Included in the following conference series:

  • Annual International Cryptology Conference
  • 8657 Accesses

  • 295 Citations

  • 3 Altmetric

Abstract

The RSA public key cryptosystem is based on a single modular equation in one variable. A natural generalization of this approach is to consider systems of several modular equations in several variables. In this paper we consider Patarin’s Hidden Field Equations (HFE) scheme, which is believed to be one of the strongest schemes of this type. We represent the published system of multivariate polynomials by a single univariate polynomial of a special form over an extension field, and use it to reduce the cryptanalytic problem to a system of ∈m 2 quadratic equations in m variables over the extension field. Finally, we develop a new relinearization method for solving such systems for any constant ∈ > 0 in expected polynomial time. The new type of attack is quite general, and in a companion paper we use it to attack other multivariate algebraic schemes, such as the Dragon encryption and signature schemes. However, we would like to emphasize that the polynomial time complexities may be infeasibly large for some choices of the parameters, and thus some variants of these schemes may remain practically unbroken in spite of the new attack.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

State of the Art of HFE Variants

Chapter © 2024

Key Recovery Attack for All Parameters of HFE-

Chapter © 2017

Cryptanalysis and Countermeasures on Multivariate Cubic Polynomial-Based Digital Signature

Chapter © 2025

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Algebraic Logic
  • Algebra
  • Cryptology
  • Field Theory and Polynomials
  • Multilinear Algebra
  • Symbolic and Algebraic Manipulation

References

  1. D. Coppersmith, J. Stern and S. Vaudenay, The Security of the Birational Permutation Signature Scheme, Journal of Cryptology, 1997, pp. 207–221.

    Google Scholar 

  2. H. Fell and W. Diffe, Analysis of a Public Key Approach Based on Polynomial Substitution, Crypto 85, Springer Verlag, pp. 340–349.

    Google Scholar 

  3. A. Kipnis and A. Shamir, Cryptanalysis of the Oil and Vinegar Signature Scheme, Crypto 98, Springer Verlag, pp. 257–266.

    Google Scholar 

  4. N. Koblitz Algebraic Aspects of Cryptography, Springer Verlag, 1998.

    Google Scholar 

  5. T. Matsumoto and H. Imai, Public Quadratic Polynomial Tuples for Efficient Signature Verification and Message Encryption, Eurocrypt 88, Springer Verlag, pp. 419–453.

    Google Scholar 

  6. H. Ong, C. P. Schnorr, and A. Shamir A Fast Signature Scheme Based on Quadratic Equations, Proc. 16-th ACM Symp. Theory of Computation, 1984, pp. 208–216.

    Google Scholar 

  7. J. Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt 88, Crypto 95, Springer Verlag, pp.248–261.

    Google Scholar 

  8. J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, Eurocrypt 96, Springer Verlag, pp.33–48.

    Google Scholar 

  9. J. Patarin, Asymmetric Cryptography with a Hidden Monomial, Crypto 96, Springer Verlag, pp. 45–60.

    Google Scholar 

  10. J. Patarin, The Oil and Vinegar Algorithm for Signatures, presented at the Dagstuhl Workshop on Cryptography, September 97.

    Google Scholar 

  11. J. M. Pollard and C. P. Schnorr, An Efficient Solution of the Congruence x2 + ky2 = m(mod n), IEEE Trans. Information Theory, vol. IT-33, no. 5, 1987, pp. 702–709.

    Article  MathSciNet  Google Scholar 

  12. A. Shamir Efficient Signature Schemes Based on Birational Permutations, Crypto 93, Springer Verlag, pp.1–12.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. NDS Technologies, Jerusalem, Israel

    Aviad Kipnis

  2. Computer Science Dept., The Weizmann Institute, Rehovot, Israel

    Adi Shamir

Authors
  1. Aviad Kipnis
    View author publications

    Search author on:PubMed Google Scholar

  2. Adi Shamir
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Entrust Technologies, 750 Heron Road, Ottawa, Ontario, Canada, KIV IA7

    Michael Wiener

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kipnis, A., Shamir, A. (1999). Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In: Wiener, M. (eds) Advances in Cryptology — CRYPTO’ 99. CRYPTO 1999. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48405-1_2

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/3-540-48405-1_2

  • Published: 16 December 1999

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66347-8

  • Online ISBN: 978-3-540-48405-9

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Quadratic Equation
  • Signature Scheme
  • Univariate Polynomial
  • Multivariate Polynomial
  • Multivariate Signature Scheme

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

172.69.130.2

ICE Institution of Civil Engineers (3000167333) - Institution of Civil Engineers Library (2000027800)