International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Cryptanalysis of SFlash v3

Authors:
Jintai Ding
Dieter Schmidt
Download:
URL: http://eprint.iacr.org/2004/103
Search ePrint
Search Google
Abstract: Sflash is a fast multivariate signature scheme. Though the first version Sflash-v1 was flawed, a second version, Sflash-v2 was selected by the Nessie Consortium and was recommended for implementation of low-end smart cards. Very recently, due to the security concern, the designer of Sflash recommended that Sflash-v2 should not be used, instead a new version Sflash-v3 is proposed, which essentially only increases the length of the signature. The Sflash family of signature schemes is a variant of the Matsumoto and Imai public key cryptosystem. The modification is through the Minus method, namely given a set of polynomial equations, one takes out a few of them to make them much more difficult to solve. In this paper, we attack the Sflash-v3 scheme by combining an idea from the relinearization method by Kipnis and Shamir, which was used to attack the Hidden Field Equation schemes, and the linearization method by Patarin. We show that the attack complexity is less than 2^80, the security standard required by the Nessie Consortium.
BibTeX
@misc{eprint-2004-12076,
  title={Cryptanalysis of SFlash v3},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography / smart cards},
  url={http://eprint.iacr.org/2004/103},
  note={ jintai.ding@uc.edu 12541 received 3 May 2004},
  author={Jintai Ding and Dieter Schmidt},
  year=2004
}