Cryptanalysis of the TRMC-4 Public Key Cryptosystem [chapter]

Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
Applied Cryptography and Network Security  
In 2006, the inventors of TRMC public key cryptosystem proposed a new variant of TRMC, TRMC-4, which can resist the existing attack, in particular, the Joux et al attack. In this paper, we show that the new version is vulnerable to attack via the linearization equations (LE) method. For any given valid ciphertext and its corresponding TRMC-4 public key, we can derive the corresponding plaintext within 2 24 F 2 8 -operations, after performing once for the public key a computation of complexity
more » ... ss than 2 34 . Our results are confirmed by computer experiments.
doi:10.1007/978-3-540-72738-5_7 dblp:conf/acns/NieHDLW07 fatcat:bdc37ti3dbhpnlho2bkyyetcny