Cryptanalysis of the TRMC-4 Public Key Cryptosystem View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2007

AUTHORS

Xuyun Nie , Lei Hu , Jintai Ding , Jianyu Li , John Wagner

ABSTRACT

In 2006, the inventors of TRMC public key cryptosystem proposed a new variant of TRMC, TRMC-4, which can resist the existing attack, in particular, the Joux et al attack. In this paper, we show that the new version is vulnerable to attack via the linearization equations (LE) method. For any given valid ciphertext and its corresponding TRMC-4 public key, we can derive the corresponding plaintext within 224-operations, after performing once for the public key a computation of complexity less than 234. Our results are confirmed by computer experiments. More... »

PAGES

104-115

Book

TITLE

RoboCup-97: Robot Soccer World Cup I

ISBN

978-3-540-64473-6
978-3-540-69789-3

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-72738-5_7

DOI

http://dx.doi.org/10.1007/978-3-540-72738-5_7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1001923249


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1605", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Policy and Administration", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/16", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Studies in Human Society", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Chinese Academy of Sciences", 
          "id": "https://www.grid.ac/institutes/grid.9227.e", 
          "name": [
            "State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100049, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Nie", 
        "givenName": "Xuyun", 
        "id": "sg:person.016122463425.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016122463425.49"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Chinese Academy of Sciences", 
          "id": "https://www.grid.ac/institutes/grid.9227.e", 
          "name": [
            "State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100049, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hu", 
        "givenName": "Lei", 
        "id": "sg:person.011566074635.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011566074635.42"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Technical University of Darmstadt", 
          "id": "https://www.grid.ac/institutes/grid.6546.1", 
          "name": [
            "Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45220, USA", 
            "Fachbereich Informatik, Technische Universit\u00e4t Darmstadt, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ding", 
        "givenName": "Jintai", 
        "id": "sg:person.010723403013.04", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Chinese Academy of Sciences", 
          "id": "https://www.grid.ac/institutes/grid.9227.e", 
          "name": [
            "State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100049, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Li", 
        "givenName": "Jianyu", 
        "id": "sg:person.016576741105.54", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016576741105.54"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Cincinnati", 
          "id": "https://www.grid.ac/institutes/grid.24827.3b", 
          "name": [
            "Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45220, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wagner", 
        "givenName": "John", 
        "id": "sg:person.010671250305.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010671250305.52"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/11767480_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1018640495", 
          "https://doi.org/10.1007/11767480_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11767480_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1018640495", 
          "https://doi.org/10.1007/11767480_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11506157_43", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033184328", 
          "https://doi.org/10.1007/11506157_43"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11506157_43", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033184328", 
          "https://doi.org/10.1007/11506157_43"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-45961-8_39", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035601256", 
          "https://doi.org/10.1007/3-540-45961-8_39"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-30580-4_18", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042849207", 
          "https://doi.org/10.1007/978-3-540-30580-4_18"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-30580-4_18", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042849207", 
          "https://doi.org/10.1007/978-3-540-30580-4_18"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44750-4_20", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051590862", 
          "https://doi.org/10.1007/3-540-44750-4_20"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44448-3_4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052740197", 
          "https://doi.org/10.1007/3-540-44448-3_4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1137/s0097539795293172", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062880065"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2007", 
    "datePublishedReg": "2007-01-01", 
    "description": "In 2006, the inventors of TRMC public key cryptosystem proposed a new variant of TRMC, TRMC-4, which can resist the existing attack, in particular, the Joux et al attack. In this paper, we show that the new version is vulnerable to attack via the linearization equations (LE) method. For any given valid ciphertext and its corresponding TRMC-4 public key, we can derive the corresponding plaintext within 224-operations, after performing once for the public key a computation of complexity less than 234. Our results are confirmed by computer experiments.", 
    "editor": [
      {
        "familyName": "Kitano", 
        "givenName": "Hiroaki", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-72738-5_7", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-64473-6", 
        "978-3-540-69789-3"
      ], 
      "name": "RoboCup-97: Robot Soccer World Cup I", 
      "type": "Book"
    }, 
    "name": "Cryptanalysis of the TRMC-4 Public Key Cryptosystem", 
    "pagination": "104-115", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1001923249"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-72738-5_7"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "092929016df74a67f3feeb2b5efb982ce252d2a743353cc276ed29afe4187742"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-72738-5_7", 
      "https://app.dimensions.ai/details/publication/pub.1001923249"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T07:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000353_0000000353/records_45336_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-540-72738-5_7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-72738-5_7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-72738-5_7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-72738-5_7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-72738-5_7'


 

This table displays all metadata directly associated to this object as RDF triples.

127 TRIPLES      23 PREDICATES      34 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-72738-5_7 schema:about anzsrc-for:16
2 anzsrc-for:1605
3 schema:author N0a19185855b04948808e216cbcde3ae2
4 schema:citation sg:pub.10.1007/11506157_43
5 sg:pub.10.1007/11767480_14
6 sg:pub.10.1007/3-540-44448-3_4
7 sg:pub.10.1007/3-540-44750-4_20
8 sg:pub.10.1007/3-540-45961-8_39
9 sg:pub.10.1007/978-3-540-30580-4_18
10 https://doi.org/10.1137/s0097539795293172
11 schema:datePublished 2007
12 schema:datePublishedReg 2007-01-01
13 schema:description In 2006, the inventors of TRMC public key cryptosystem proposed a new variant of TRMC, TRMC-4, which can resist the existing attack, in particular, the Joux et al attack. In this paper, we show that the new version is vulnerable to attack via the linearization equations (LE) method. For any given valid ciphertext and its corresponding TRMC-4 public key, we can derive the corresponding plaintext within 224-operations, after performing once for the public key a computation of complexity less than 234. Our results are confirmed by computer experiments.
14 schema:editor N218101665fa34a77b07ff55533446437
15 schema:genre chapter
16 schema:inLanguage en
17 schema:isAccessibleForFree false
18 schema:isPartOf Ncb2b76b7fc464910a7b75c316959e4a2
19 schema:name Cryptanalysis of the TRMC-4 Public Key Cryptosystem
20 schema:pagination 104-115
21 schema:productId N3ce7ebc56dad44caa14a059a74dba9a8
22 N40c0b6b3b2e846bbb03e7f06b9085f4e
23 N864bd82e8e0149378346ff03c1d8f27a
24 schema:publisher N1b74f600647a4cdbb001294307fc7ebf
25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001923249
26 https://doi.org/10.1007/978-3-540-72738-5_7
27 schema:sdDatePublished 2019-04-16T07:09
28 schema:sdLicense https://scigraph.springernature.com/explorer/license/
29 schema:sdPublisher Nb0d56268ea4640ebaa1691aad92fd709
30 schema:url https://link.springer.com/10.1007%2F978-3-540-72738-5_7
31 sgo:license sg:explorer/license/
32 sgo:sdDataset chapters
33 rdf:type schema:Chapter
34 N0a19185855b04948808e216cbcde3ae2 rdf:first sg:person.016122463425.49
35 rdf:rest Nbe4d694061974dd080f3ca4152ef51a2
36 N1b74f600647a4cdbb001294307fc7ebf schema:location Berlin, Heidelberg
37 schema:name Springer Berlin Heidelberg
38 rdf:type schema:Organisation
39 N218101665fa34a77b07ff55533446437 rdf:first Nc5330764d2144a45858146831ddecc84
40 rdf:rest rdf:nil
41 N3ce7ebc56dad44caa14a059a74dba9a8 schema:name dimensions_id
42 schema:value pub.1001923249
43 rdf:type schema:PropertyValue
44 N40c0b6b3b2e846bbb03e7f06b9085f4e schema:name readcube_id
45 schema:value 092929016df74a67f3feeb2b5efb982ce252d2a743353cc276ed29afe4187742
46 rdf:type schema:PropertyValue
47 N5b2cd6a30a984bd09ded59d9d71bc009 rdf:first sg:person.016576741105.54
48 rdf:rest Nb89ec6e1df8c4e4a8122f65c7dd48ead
49 N77691558fb4c43cc9dab4c7d4cbf61a0 rdf:first sg:person.010723403013.04
50 rdf:rest N5b2cd6a30a984bd09ded59d9d71bc009
51 N864bd82e8e0149378346ff03c1d8f27a schema:name doi
52 schema:value 10.1007/978-3-540-72738-5_7
53 rdf:type schema:PropertyValue
54 Nb0d56268ea4640ebaa1691aad92fd709 schema:name Springer Nature - SN SciGraph project
55 rdf:type schema:Organization
56 Nb89ec6e1df8c4e4a8122f65c7dd48ead rdf:first sg:person.010671250305.52
57 rdf:rest rdf:nil
58 Nbe4d694061974dd080f3ca4152ef51a2 rdf:first sg:person.011566074635.42
59 rdf:rest N77691558fb4c43cc9dab4c7d4cbf61a0
60 Nc5330764d2144a45858146831ddecc84 schema:familyName Kitano
61 schema:givenName Hiroaki
62 rdf:type schema:Person
63 Ncb2b76b7fc464910a7b75c316959e4a2 schema:isbn 978-3-540-64473-6
64 978-3-540-69789-3
65 schema:name RoboCup-97: Robot Soccer World Cup I
66 rdf:type schema:Book
67 anzsrc-for:16 schema:inDefinedTermSet anzsrc-for:
68 schema:name Studies in Human Society
69 rdf:type schema:DefinedTerm
70 anzsrc-for:1605 schema:inDefinedTermSet anzsrc-for:
71 schema:name Policy and Administration
72 rdf:type schema:DefinedTerm
73 sg:person.010671250305.52 schema:affiliation https://www.grid.ac/institutes/grid.24827.3b
74 schema:familyName Wagner
75 schema:givenName John
76 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010671250305.52
77 rdf:type schema:Person
78 sg:person.010723403013.04 schema:affiliation https://www.grid.ac/institutes/grid.6546.1
79 schema:familyName Ding
80 schema:givenName Jintai
81 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04
82 rdf:type schema:Person
83 sg:person.011566074635.42 schema:affiliation https://www.grid.ac/institutes/grid.9227.e
84 schema:familyName Hu
85 schema:givenName Lei
86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011566074635.42
87 rdf:type schema:Person
88 sg:person.016122463425.49 schema:affiliation https://www.grid.ac/institutes/grid.9227.e
89 schema:familyName Nie
90 schema:givenName Xuyun
91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016122463425.49
92 rdf:type schema:Person
93 sg:person.016576741105.54 schema:affiliation https://www.grid.ac/institutes/grid.9227.e
94 schema:familyName Li
95 schema:givenName Jianyu
96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016576741105.54
97 rdf:type schema:Person
98 sg:pub.10.1007/11506157_43 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033184328
99 https://doi.org/10.1007/11506157_43
100 rdf:type schema:CreativeWork
101 sg:pub.10.1007/11767480_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018640495
102 https://doi.org/10.1007/11767480_14
103 rdf:type schema:CreativeWork
104 sg:pub.10.1007/3-540-44448-3_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052740197
105 https://doi.org/10.1007/3-540-44448-3_4
106 rdf:type schema:CreativeWork
107 sg:pub.10.1007/3-540-44750-4_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051590862
108 https://doi.org/10.1007/3-540-44750-4_20
109 rdf:type schema:CreativeWork
110 sg:pub.10.1007/3-540-45961-8_39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035601256
111 https://doi.org/10.1007/3-540-45961-8_39
112 rdf:type schema:CreativeWork
113 sg:pub.10.1007/978-3-540-30580-4_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042849207
114 https://doi.org/10.1007/978-3-540-30580-4_18
115 rdf:type schema:CreativeWork
116 https://doi.org/10.1137/s0097539795293172 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062880065
117 rdf:type schema:CreativeWork
118 https://www.grid.ac/institutes/grid.24827.3b schema:alternateName University of Cincinnati
119 schema:name Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45220, USA
120 rdf:type schema:Organization
121 https://www.grid.ac/institutes/grid.6546.1 schema:alternateName Technical University of Darmstadt
122 schema:name Department of Mathematical Sciences, University of Cincinnati, Cincinnati, OH, 45220, USA
123 Fachbereich Informatik, Technische Universität Darmstadt, Germany
124 rdf:type schema:Organization
125 https://www.grid.ac/institutes/grid.9227.e schema:alternateName Chinese Academy of Sciences
126 schema:name State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100049, China
127 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...