1 / 18

A Ciphertext-Only Attack on Polly Two

A Ciphertext-Only Attack on Polly Two. Rainer Steinwandt. (Florida Atlantic University). Polly Cracker. Conceptual public key encryption scheme introduced by Fellows and Koblitz (‘94) Basic idea over F q [x]:= F q [x 1 ,…,x n ] : Public key: finite basis of ideal I ≤ F q [x]

denise
Télécharger la présentation

A Ciphertext-Only Attack on Polly Two

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Ciphertext-Only Attack on Polly Two Rainer Steinwandt (Florida Atlantic University)

  2. Polly Cracker • Conceptual public key encryption scheme introduced by Fellows and Koblitz (‘94) • Basic idea over Fq[x]:=Fq[x1,…,xn] : Public key: finite basis of ideal I ≤Fq[x] Secret key: common root ξV(I) Encrypting mFq: choose representative of m+I Decrypting cFq[x]: evaluate c at ξ Can we get an encryption scheme out of this?

  3. Security of Polly Cracker • Polly Cracker by definition homomorphic  we can’t expect IND-CCA (S., Geiselmann: CCA easily reveals ξ) • IND-CPA has not been achieved so far: no security proofs for encryption, various successful attacks, e.g., • intelligent linear algebra (Lenstra) • differential attack (Hofheinz, S.) • improved diff. attack (Levy-dit-Vehel, Perret) Can we obtain an efficient heuristic scheme?

  4. A Proposal Resistant to Lin. Alg. Levy-dit-Vehel, Perret ‘04: “Reasonably efficient” Polly Cracker system based on 3-SAT: • elaborate key generation • encryption procedure designed to resist intelligent linear algebra attack, … but the authors note that “the attack … and the improvement we have described… apply to our system too.”

  5. Polly Two Ly (‘02) proposes a new related scheme: • Domain parameters: g1,…,gtFq[x] s.t. kernel of φ: Fq[y] Fq[x] yi  gi can be computed easily (syzygies of the gi) • Public key: sparse generators of I ≤ Fq[y] • Secret key:ξFqn with (gi(ξ))iV(I) and (g1 ∙…∙gt)(ξ)≠0 “Challenge example”: n=4, t=11, q=223, tdeg(gi)=2

  6. Polly Two (cntd.) Encrypting mFq with public basis {f1,…,fs}: • Fix random hi:= αi∙yηiwith monomials in c’’:=Σhifi getting canceled. 2. For each monomial of c’’ find a ker(φ)-element canceling it. In c’:=c’’+r (with rker(φ)) none of c’’ ‘s monomials should occur. 3. Choose monomial yκ in c’ to get ciphertext c:=(c’+m∙yκ, κ) Decryption: evaluate at g(ξ)& divide by g(ξ)κ

  7. Design Rationale • sparse high-degree public polynomialsimpede direct Gröbner basis computation (cf. ENROOT) • addition of ker(φ)-element hampers linear algebra attack • message expansion more or less acceptable promising proposal to dodge known attacks … is “the list” complete?  Grassl, S. ‘04: low-degree elements in radical of public ideal allow to solve 1st challenge

  8. “Challenge #2” • Domain param.: 11 quadratic binomials over F223 • Public basis: 4 trinomials, total deg. 128, 11 indeterminates • Ciphertext c: 126 terms, total deg. 256 (indermediate ciphertext c’’: ≤6 terms) Goal of attack: reconstruct encryption step no recovery of secret (or equivalent) key

  9. Recovering the ker(φ)-Part All terms of the ker(φ)-elements canceling terms in Σhifishould occur in c up to – the canceled term (- a term involving yκ ) omit yκ –term from ciphertext c & identify terms of the ≤6 ker(φ)-elements How can we find the terms of a syzygy?

  10. Choice of ker(φ)-Polynomials Likely construction for ker(φ)-elements used in encryption: multiply low-degree syzygy with a term α∙yη fix a term β∙yσ of yκ –free ciphertext ĉ andcompute multiset {gcd(yσ, yπ): yπ≠yσ a monomial inĉ} high multiplicity (say >10) yields yη-candidate Challenge: 137 candidates for yη … only 22 after removing multiples

  11. Finding the Terms of a Syzygy Given ayη-candidate, we can find the terms {β∙yσ : β∙yσ is a term of ĉ divisible by yη}. … summing (almost) all of them up should yield “a ker(φ)-element up to one term”. How can we check whether a polynomial is a “syzygy up to one term”?

  12. Validating an “Almost Syzygy” r … in principle: evaluate r at g(x) & check whether r(g1(x),…,gt(x)) is (up to a const.) a power product of the gi … in practice: specialize some xj’s to constants before trial division. In this way we find the missing term, too (& can validate through repeated evaluation).

  13. … Indeed It Works Applying the idea to the challenge: Candidate term sets have ≈20 terms & adding one of these sets upyields 1st syzygy subtract syzygy from ĉ & iterate Five syzygies can be found easily, leaving us with a simplified ĉ consisting of 27 terms.

  14. Recovering the Secret Terms hi Tempting: Apply “differential attack” of Hofheinz and S. to simplified ĉ yields only one term h2 … but a simple approach turns out to suffice: Remaining public key polynomials contain term with only two multiples in simplified ĉ. recovery of all secret terms hi

  15. … Getting the Plaintext Subtracting Σhifi + found ker(φ)-part from the ciphertext, yields (short) polynomial that up to the term -m∙yκ is a syzygy. Complete missing term as before to get m. Plaintext underlying the example: 308834

  16. Conclusion? • Ample evidencethat present form of Polly Two not cryptographically secure. • Do we want Polly Two+ with a longer list […, linear algebra, differential attack, small degree in radical, this attack]? • Need the assumptions underlying the encryption algorithm to be clarified?

  17. Stronger Attacks? Design of encryption algorithm: hide c’’=Σhifi (by adding a syzygy) This attack: “Playing with terms” reveals c’’ Better approaches, e.g.,interpolation? • c’’: sparse multivariate polynomial over Fq • #terms in c’’ can be guessed • bounding tdeg(c’’) not implausible

  18. Sparse Interpolation? Evaluation of c’’+m∙yκ: possible on the variety parameterized by the domain parameters g1,…,gt. Question: Under which assumptions is this kind of interpolation problem feasible?

More Related