Presentation | 2010-11-17 Attack Derivation for Cryptographic Assumptions in the Generic Model with a Computer Algebra System Kenta KUMOJIMA, Maki YOSHIDA, Masayuki ABE, Miyako OHKUBO, Toru FUJIWARA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The computational hardness of number-theoretic problems used in cryptography is generally proved in a generic model of the based mathematical structure such as a bilinear group. However, a proof often contains flaws due to miss of attacks. To assist proof, this paper proposes an automatic analysis method which derives attacks by solving simultaneous equations. We demonstrate the usefulness of the proposed method by using a computer algebra system called Maple. Specifically, we apply the proposed method to well-known easy/hard problems (M-LRSW/LIN) and confirm that it successfully derives an attack to M-LRSW within a second, which is a generalized version of the known attack, whereas LIN is decided that there is no attack. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cryptographic assumptions / generic model / attack derivation / computer algebra system |
Paper # | ISEC2010-58,LOIS2010-37 |
Date of Issue |
Conference Information | |
Committee | LOIS |
---|---|
Conference Date | 2010/11/10(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Life Intelligence and Office Information Systems (LOIS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Attack Derivation for Cryptographic Assumptions in the Generic Model with a Computer Algebra System |
Sub Title (in English) | |
Keyword(1) | Cryptographic assumptions |
Keyword(2) | generic model |
Keyword(3) | attack derivation |
Keyword(4) | computer algebra system |
1st Author's Name | Kenta KUMOJIMA |
1st Author's Affiliation | Graduate School of Information Science and Technology, Osaka University() |
2nd Author's Name | Maki YOSHIDA |
2nd Author's Affiliation | Graduate School of Information Science and Technology, Osaka University |
3rd Author's Name | Masayuki ABE |
3rd Author's Affiliation | NTT Information Sharing Platform Laboratories |
4th Author's Name | Miyako OHKUBO |
4th Author's Affiliation | NICT Information Security Research Center |
5th Author's Name | Toru FUJIWARA |
5th Author's Affiliation | Graduate School of Information Science and Technology, Osaka University |
Date | 2010-11-17 |
Paper # | ISEC2010-58,LOIS2010-37 |
Volume (vol) | vol.110 |
Number (no) | 282 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |