Decomposing attacks on asymmetric cryptography based on mapping compositions

Citation
Df. Ye et al., Decomposing attacks on asymmetric cryptography based on mapping compositions, J CRYPTOL, 14(2), 2001, pp. 137-150
Citations number
17
Categorie Soggetti
Computer Science & Engineering
Journal title
JOURNAL OF CRYPTOLOGY
ISSN journal
09332790 → ACNP
Volume
14
Issue
2
Year of publication
2001
Pages
137 - 150
Database
ISI
SICI code
0933-2790(200121)14:2<137:DAOACB>2.0.ZU;2-U
Abstract
Given the algebraic expression of the composition of two mappings how can o ne identify the two components? This is the problem of mapping decompositio n, of which the usual function-decomposition problem [8] is a special case. It was believed that this problem is intractable in general. Some public k ey cryptosystems (PKC) are based on the difficulty of this mathematical pro blem. Two types of such PKCs are FAPKC. proposed by Tao [16]. and the "2R-s chemes," proposed by Patarin and Goubin [11], [12]. FAPKC is based on compo sing finite automata (FA). while the "2R-schemes" use quadratic functions a s the components. In this paper the decomposition problem for FA and for qu adratic functions is investigated. Several methods for FA decomposing and o ne for quadratic functions are discovered. It is demonstrated that FA compo sition often exposes essential information about the components and that th e full expression of composition of quadratic functions should not be given in 2R-schemes.