International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem

Authors:
Jintai Ding
Timonthy Hodges
Download:
URL: http://eprint.iacr.org/2003/084
Search ePrint
Search Google
Abstract: A Tamed Transformation Method (TTM) cryptosystem was proposed by T.T.Moh in 1999. We describe how the first implementation scheme of the TTM system can be defeated. The computational complexity of our attack is $2^{33}$ computations on the finite field with $2^8$ elements.
BibTeX
@misc{eprint-2003-11800,
  title={Cryptanalysis of an implementation scheme of the Tamed Transformation Method  cryptosystem},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography / Cryptanalysis, TTM},
  url={http://eprint.iacr.org/2003/084},
  note={ ding@math.uc.edu 12172 received 30 Apr 2003},
  author={Jintai Ding and Timonthy Hodges},
  year=2003
}