Presentation 2010-11-17
Attack Derivation for Cryptographic Assumptions in the Generic Model with a Computer Algebra System
Kenta KUMOJIMA, Maki YOSHIDA, Masayuki ABE, Miyako OHKUBO, Toru FUJIWARA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The computational hardness of number-theoretic problems used in cryptography is generally proved in a generic model of the based mathematical structure such as a bilinear group. However, a proof often contains flaws due to miss of attacks. To assist proof, this paper proposes an automatic analysis method which derives attacks by solving simultaneous equations. We demonstrate the usefulness of the proposed method by using a computer algebra system called Maple. Specifically, we apply the proposed method to well-known easy/hard problems (M-LRSW/LIN) and confirm that it successfully derives an attack to M-LRSW within a second, which is a generalized version of the known attack, whereas LIN is decided that there is no attack.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Cryptographic assumptions / generic model / attack derivation / computer algebra system
Paper # ISEC2010-58,LOIS2010-37
Date of Issue

Conference Information
Committee LOIS
Conference Date 2010/11/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Life Intelligence and Office Information Systems (LOIS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Attack Derivation for Cryptographic Assumptions in the Generic Model with a Computer Algebra System
Sub Title (in English)
Keyword(1) Cryptographic assumptions
Keyword(2) generic model
Keyword(3) attack derivation
Keyword(4) computer algebra system
1st Author's Name Kenta KUMOJIMA
1st Author's Affiliation Graduate School of Information Science and Technology, Osaka University()
2nd Author's Name Maki YOSHIDA
2nd Author's Affiliation Graduate School of Information Science and Technology, Osaka University
3rd Author's Name Masayuki ABE
3rd Author's Affiliation NTT Information Sharing Platform Laboratories
4th Author's Name Miyako OHKUBO
4th Author's Affiliation NICT Information Security Research Center
5th Author's Name Toru FUJIWARA
5th Author's Affiliation Graduate School of Information Science and Technology, Osaka University
Date 2010-11-17
Paper # ISEC2010-58,LOIS2010-37
Volume (vol) vol.110
Number (no) 282
Page pp.pp.-
#Pages 8
Date of Issue