HUANG Huawei, DENG Lunzhi, LI Chunhua, et al., “Cryptanalysis of an Encryption Scheme Using Matrices over Finite Fields,” Chinese Journal of Electronics, vol. 27, no. 2, pp. 292-296, 2018, doi: 10.1049/cje.2017.07.007
Citation: HUANG Huawei, DENG Lunzhi, LI Chunhua, et al., “Cryptanalysis of an Encryption Scheme Using Matrices over Finite Fields,” Chinese Journal of Electronics, vol. 27, no. 2, pp. 292-296, 2018, doi: 10.1049/cje.2017.07.007

Cryptanalysis of an Encryption Scheme Using Matrices over Finite Fields

doi: 10.1049/cje.2017.07.007
Funds:  This work is supported by the National Natural Science Foundation of China (No.61462016, No.61562012, No.11261018), the Science and Technology Foundation of Guizhou Province (No.[2014]2125, No.[2014]2142), the Doctorial Foundation of Guizhou Normal University (No.[2014]11904-0514021), and the Youth Science and Technology Talent Growth Program of Guizhou Province's Department of Education (No.[2016]130).
  • Received Date: 2015-12-21
  • Rev Recd Date: 2017-03-23
  • Publish Date: 2018-03-10
  • This paper presents an attack on an encryption scheme proposed by Pei et al. using matrices over finite fields in 2010. The public information allows the derivation of a system of polynomial equations for the equivalent secret key. By the equivalent secret key, the plaintexts of the encryption scheme can be obtained by the public key and the ciphertexts without the secret key.
  • loading
  • M.J. Shi, "Optimal p-ary codes from one-weight linear codes over Zpm", Chinese Journal of Electronics, Vol.22, No.4, pp.799-802, 2013.
    M.J. Shi, P. Solé and B. Wu., "Cyclic codes and the weight enumerators over F2+ vF2+ v2F2", Applied and Computational Mathematics, Vol.12, No.2, pp.247-255, 2013.
    M.J. Shi, S.X. Zhu and S.L. Yang, "A class of optimal p-ary codes from one-weight codes over Fp[u]/m>", Journal of the Franklin Institute, Vol.350, No.5, pp.729-737, 2013.
    M.K. Singh, "Public key cryptography with matrices", Pro. of the IEEE Workshop on Information Assurance, United States Military Academy, pp.146-152, 2004.
    E. Stickel, "A new method for exchanging secret keys", Proc. of the Third International Conference on Information Technology and Applications (ICITA05), Vol.2, pp.426-430, 2005.
    V. Shpilrain, "Cryptanalysis of Stickel's key exchange scheme", Third International Computer Science Symposium in Russia, Csr, Moscow, Russia, LNCS 5010, pp.283-288, 2008.
    R. Alvarez, F.M. Martinez, J. Vicent, et al., "A matricial public key cryptosystem with digital signature", WSEAS Transactions on Mathematics, Vol.7, No.4, pp.195-204, 2008.
    R. Alvarez, L. Tortosa, J. Vicent, et al., "Analysis and design of a secure key exchange scheme", Information Sciences, Vol.179, No.12, pp.2014-2021, 2009.
    A.A. Kamal and A.M. Youssef, "Cryptanalysis of Alvarez et al. key exchange scheme", Information Sciences, Vol.223, No.20, pp.317-321, 2013.
    Y. Zhao, L. Wang and L.W. Zhang, "Information-exchange using the ergodic matrices in GF(2)", Proc. ACNS 2004, Icisa Press, pp.388-397, 2004.
    S. Pei, Y. Zhao and H. Zhao, "Construct public key encryption scheme using ergodic matrices over GF(2)", Theory and Applications of Models of Computation (TAMC 2007). LNCS 4484. Springer, Berlin, Heidelberg, pp.181-188, 2007.
    Y. Zhao, B. Zhao and S. Pei, "On the properties of the ergodic matrix over finite field", ACTA Mathematica Sinica, Vol.55, No.3, pp.457-468, 2012. (in Chinese)
    S. Pei, Y. Zhao and H. Zhao, "Public key encryption scheme based on the ergodic matrices", Acta Electronica Sinica, Vol.38, No.8, pp.1908-1913, 2010. (in Chinese)
    M. Rasslan and A. Youssef, "Cryptanalysis of a public key encryption scheme using ergodic matrices", IEICE Trans. Fundamentals, Vol.E94-A, No.2, pp.853-854, 2011.
    C.S. Gu, Z. Jing, Z.M. Yu, et al., "Security on public key encryption scheme based on ergodic matrices", Acta Electronica Sinica. Vol.42, No.10, pp.2081-2085, 2014. (in Chinese)
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (575) PDF downloads(313) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return