Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem

  • Authors:
  • Charles Bouillaguet;Jean-Charles Faugère;Pierre-Alain Fouque;Ludovic Perret

  • Affiliations:
  • Ecole Normale Supérieure, Paris, France;INRIA, Paris-Rocquencourt Center, UPMC Univ. Paris 06, UMR, LIP6, Paris, France and CNRS, UMR, LIP6, Paris, France;Ecole Normale Supérieure, Paris, France;CNRS, UMR, LIP6, Paris, France and INRIA, Paris-Rocquencourt Center, UPMC Univ. Paris 06, UMR, LIP6, Paris, France

  • Venue:
  • PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a practical cryptanalysis of the Identification Scheme proposed by Patarin at Crypto 1996. This scheme relies on the hardness of the Isomorphism of Polynomial with One Secret (IP1S), and enjoys shorter key than many other schemes based on the hardness of a combinatorial problem (as opposed to number-theoretic problems). Patarin proposed concrete parameters that have not been broken faster than exhaustive search so far. On the theoretical side, IP1S has been shown to be harder than Graph Isomorphism, which makes it an interesting target. We present two new deterministic algorithms to attack the IP1S problem, and we rigorously analyze their complexity and success probability. We show that they can solve a (big) constant fraction of all the instances of degree two in polynomial time. We verified that our algorithms are very efficient in practice. All the parameters with degree two proposed by Patarin are now broken in a few seconds. The parameters with degree three can be broken in less than a CPU-month. The identification scheme is thus quite badly broken.