11.07.2015 Views

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

After translating from cubic into quadratic format, it becomes 384 equationsand 384 unknowns. This is much smaller than the 3168 equations and 3168 unknownswe had before. In each case, ElimLin, Magma, Singular, and the methodsof Chapter 3 solved the system for k 0 , . . . , k 63 in time too short to measure accurately(i.e. less than 1 minute).It should be noted that we require two fixed points, not merely one, to makethe attack work.One fixed point alone is not enough of a constraint to narrowthe keyspace sufficiently. However, two fixed points was sufficient each time it wastried. Therefore, we will assume f has two or more fixed points, and adjust ourprobabilities of success accordingly.One way to look at this is to say that onlythose keys which result in two or more fixed points are vulnerable to our attack.However, since the key changes rapidly in most applications (See Section 2.6 onpage 34), and since approximately 26.42% of random functions GF(2) 32 → GF(2) 32have this property (See Section 2.4.8 on page 29), we do not believe this to be amajor drawback.2.4.4 How to Find Fixed PointsObviously a fixed point of f k is a fixed point of f (8)kas well, but the reverseis not necessarily true. Stated differently, the set of fixed points of f (8)kwill containthe set of all fixed points of f k .We will first calculate the set of fixed points of f (8)k, which will be very small.We will try the attack given in the previous subsection, using every pair of fixed20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!