Local inversion of maps: A new attack on Symmetric encryption, RSA and ECDLP

02/14/2022
by   Virendra Sule, et al.
0

This paper presents algorithms for local inversion of maps and shows how several important computational problems such as cryptanalysis of symmetric encryption algorithms, RSA algorithm and solving the elliptic curve discrete log problem (ECDLP) can be addressed as local inversion problems. The methodology is termed as the Local Inversion Attack. It utilizes the concept of Linear Complexity (LC) of a recurrence sequence generated by the map defined by the cryptanalysis problem and the given data. It is shown that when the LC of the recurrence is bounded by a bound of polynomial order in the bit length of the input to the map, the local inversion can be accomplished in polynomial time. Hence an incomplete local inversion algorithm which searches a solution within a specified bound on computation can estimate the density of weak cases of cryptanalysis defined by such data causing low LC. Such cases can happen accidentally but cannot be avoided in practice and are fatal insecurity flaws of cryptographic primitives which are wrongly assumed to be secure on the basis of exponential average case complexity. An incomplete algorithm is proposed for solving problems such as key recovery of symmetric encryption algorithms, decryption of RSA ciphertext without factoring the modulus, decrypting any ciphertext of RSA given one plaintext ciphertext pair created with same public key in chosen ciphertext attack and solving the discrete logarithm on elliptic curves over finite fields (ECDLP) as local inversion problems. It is shown that when the LCs of the respective recurrences for given data are small, solutions of these problems are possible in practically feasible time and memory resources.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/07/2022

Local Inversion of maps: Black box Cryptanalysis

This paper is a short summery of results announced in a previous paper o...
research
05/16/2021

A Complete algorithm for local inversion of maps: Application to Cryptanalysis

For a map (function) F(x):^n→^n and a given y in the image of F the prob...
research
09/28/2018

A Candidate Group with Infeasible Inversion

Motivated by the potential cryptographic application of building a direc...
research
08/19/2019

Weil descent and cryptographic trilinear maps

It has recently been shown that cryptographic trilinear maps are suffici...
research
09/15/2021

The Elliptic Net Algorithm Revisited

Pairings have been widely used since their introduction to cryptography....
research
09/19/2019

A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem

In this paper, we intend to study the geometric meaning of the discrete ...
research
06/12/2020

Analysis, Design, and Generalization of Electrochemical Impedance Spectroscopy (EIS) Inversion Algorithms

We introduce a framework for analyzing and designing EIS inversion algor...

Please sign up or login with your details

Forgot password? Click here to reset