Security of the cryptosystems based on ergodic matrices
Academic paper|更新时间:2024-06-05
|
Security of the cryptosystems based on ergodic matrices
Journal on CommunicationsVol. 36, Issue 8, Pages: 61-67(2015)
作者机构:
1. 贵州师范大学 数学与计算机科学学院,贵州 贵阳 550001
2. 贵州师范学院 数学与计算机科学学院,贵州 贵阳 550018
3. 华东交通大学 理学院, 江西 南昌 330013
作者简介:
基金信息:
The National Natural Science Foundation of China(61462016);The National Natural Science Foundation of China(11261018);The Doctorial Foundation of Guizhou Normal University([2014]11904-0514021)
Hua-wei HUANG, Chang-wen PENG, Yun-yun QU, et al. Security of the cryptosystems based on ergodic matrices[J]. Journal on Communications, 2015, 36(8): 61-67.
DOI:
Hua-wei HUANG, Chang-wen PENG, Yun-yun QU, et al. Security of the cryptosystems based on ergodic matrices[J]. Journal on Communications, 2015, 36(8): 61-67. DOI: 10.11959/j.issn.1000-436x.2015128.
Security of the cryptosystems based on ergodic matrices
The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key
a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly
then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.
关键词
Keywords
references
DING J T . Multi-Variate Public Key Cryptosystems [M ] . Berlin : Springer-VerlagPress , 2006 .
MUKESH K S . Public key cryptography with matrices [A ] . Proceedings of the IEEE Workshop on Information Assurance [C ] . United States Military Academy , 2004 . 146 - 152 .
STICKEL E . A new method for exchanging secret keys [A ] . Proc of the Third International Conference on Information Technology and Applications(ICITA05) [C ] . 2005 . 426 - 430 .
SHPILRAIN V . Cryptanalysis of stickel’s key exchange scheme [A ] . Computer Science in Russia 2008,LNCS 5010 [C ] . 2008 . 283 - 288 .
ZHAO Y , WANG L , ZHANG W . Information-exchange using the ergodic matrices in GF(2) [A ] . Proc ACNS 2004 [C ] . Icisa Press , 2004 . 388 - 397 .
ZHAO Y Z , JIANG Z H , HUANG S L . Implementation of Shamir’s three pass protocol based on ergodic matrix over finite field [J ] . MiniMicro Systems , 2006 , 27 ( 6 ): 986 - 991 .
ZHAO Y Z , PEI S H , WANG H J , et al . Using the ergodic matrices over finite field to construct the dynamic encryptor [J ] . Mini-Micro Systems , 2007 , 28 ( 11 ): 2010 - 2014 .
PEI S H , ZHAO Y Z , ZHAO H W . Construct public key encryption scheme using ergodic matrices over GF(2) [A ] . TAMC 2007 [C ] . Berlin,Springer-Verlag , 2007 . 181 - 188 .
PEI S H , ZHAO H W , ZHAO Y Z . Public key cryptography based on ergodic matrices over finite field [J ] . Wuhan University Journal of Natural Sciences , 2006 , 11 ( 6 ): 1525 - 1528 .
PEI S H , ZHAO Y Z , ZHAO H W . Public key encryption scheme based on the ergodic matrices [J ] . Chinese Journal of Electronics , 2010 , 38 ( 8 ): 1908 - 1913 .