Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daniel C. Smith-Tone is active.

Publication


Featured researches published by Daniel C. Smith-Tone.


PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography | 2011

On the differential security of multivariate public key cryptosystems

Daniel C. Smith-Tone

Since the discovery of an algorithm for factoring and computing discrete logarithms in polynomial time on a quantum computer, the cryptographic community has been searching for an alternative for security in the approaching post-quantum world. One excellent candidate is multivariate public key cryptography. Though the speed and parameterizable nature of such schemes is desirable, a standard metric for determining the security of a multivariate cryptosystem has been lacking. We present a reasonable measure for security against the common differential attacks and derive this measurement for several modern multivariate public key cryptosystems.


IACR Cryptology ePrint Archive | 2014

An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme

Dustin Moody; Ray A. Perlner; Daniel C. Smith-Tone

Historically, multivariate public key cryptography has been less than successful at offering encryption schemes which are both secure and efficient. At PQCRYPTO ’13 in Limoges, Tao, Diene, Tang, and Ding introduced a promising new multivariate encryption algorithm based on a fundamentally new idea: hiding the structure of a large matrix algebra over a finite field. We present an attack based on subspace differential invariants inherent to this methodology. The attack is a structural key recovery attack which is asymptotically optimal among all known attacks (including algebraic attacks) on the original scheme and its generalizations.


IACR Cryptology ePrint Archive | 2014

Differential Properties of the HFE Cryptosystem

Taylor Daniels; Daniel C. Smith-Tone

Multivariate Public Key Cryptography (MPKC) has been put forth as a possible post-quantum family of cryptographic schemes. These schemes lack provable security in the reduction theoretic sense, and so their security against yet undiscovered attacks remains uncertain. The effectiveness of differential attacks on various field-based systems has prompted the investigation of differential properties of multivariate schemes to determine the extent to which they are secure from differential adversaries. Due to its role as a basis for both encryption and signature schemes we contribute to this investigation focusing on the HFE cryptosystem. We derive the differential symmetric and invariant structure of the HFE central map and that of HFE − and provide a collection of parameter sets which make these HFE systems provably secure against a differential symmetric or differential invariant attack.


Fifth International Workshop on Post-Quantum Cryptography (PQCrypto 2013); June 4-7, 2013; Limoges, France | 2013

A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems

Ray A. Perlner; Daniel C. Smith-Tone

Multivariate Public Key Cryptography(MPKC) has become one of a few options for security in the quantum model of computing. Though a few multivariate systems have resisted years of effort from the cryptanalytic community, many such systems have fallen to a surprisingly small pool of techniques. There have been several recent attempts at formalizing more robust security arguments in this venue with varying degrees of applicability. We present an extension of one such recent measure of security against a differential adversary which has the benefit of being immediately applicable in a general setting on unmodified multivariate schemes.


international conference on selected areas in cryptography | 2016

Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme

Dustin Moody; Ray A. Perlner; Daniel C. Smith-Tone

In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes which utilize the structure of a large matrix algebra to construct effectively invertible systems of nonlinear equations hidden by an isomorphism of polynomials. The cubic version of the ABC Simple Matrix Encryption was developed with provable security in mind and was published including a heuristic security argument claiming that an attack on the scheme should be at least as difficult as solving a random system of quadratic equations over a finite field.


PQCrypto 2017: The Eighth International Conference on Post-Quantum Cryptography | 2017

Key Recovery Attack for All Parameters of HFE

Jeremy Vates; Daniel C. Smith-Tone

Recently, by an interesting confluence, multivariate schemes with the minus modifier have received attention as candidates for multivariate encryption. Among these candidates is the twenty year old HFE(^-) scheme originally envisioned as a possible candidate for both encryption and digital signatures, depending on the number of public equations removed.


PQCrypto 2017: The Eighth International Conference on Post-Quantum Cryptography | 2017

Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme

Dustin Moody; Ray A. Perlner; Daniel C. Smith-Tone

In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes which utilize the structure of a large matrix algebra to construct effectively invertible systems of nonlinear equations hidden by an isomorphism of polynomials. One promising approach to cryptanalyzing these schemes has been structural cryptanalysis, based on applying a strategy similar to MinRank attacks to the discrete differential. These attacks however have been significantly more expensive when applied to parameters using fields of characteristic 2, which have been the most common choice for published parameters. This disparity is especially great for the cubic version of the Simple Matrix Encryption Scheme.


international conference on selected areas in cryptography | 2017

Total Break of the SRP Encryption Scheme

Ray A. Perlner; Albrecht Petzoldt; Daniel C. Smith-Tone

Multivariate Public Key Cryptography (MPKC) is one of the main candidates for secure communication in a post-quantum era. Recently, Yasuda and Sakurai proposed in [7] a new multivariate encryption scheme called SRP, which combines the Square encryption scheme with the Rainbow signature scheme and the Plus modifier.


PQCrypto 2017: The Eighth International Conference on Post-Quantum Cryptography | 2017

Key Recovery Attack for ZHFE

Daniel Cabarcas; Daniel C. Smith-Tone; Javier A. Verbel

At PQCRYPTO 2014, Porras, Baena and Ding introduced ZHFE, an interesting new technique for multivariate post-quantum encryption. The scheme is a generalization of HFE in which a single low degree polynomial in the central map is replaced by a pair of high degree polynomials with a low degree cubic polynomial contained in the ideal they generate. We present a key recovery attack for ZHFE based on the independent discoveries of the low rank property of ZHFE by Verbel and by Perlner and Smith-Tone. Thus, although the two central maps of ZHFE have high degree, their low rank property makes ZHFE vulnerable to the Kipnis-Shamir (KS) rank attack. We adapt KS attack pioneered by Bettale, Faugere and Perret in application to HFE, and asymptotically break ZHFE.


9th International Conference on Post-Quantum Cryptography (PQCrypto 2018); April 9-11, 2018; Fort Lauderdale, Florida, United States | 2018

HFERP - A new multivariate encryption scheme

Yashuhiko Ikematsu; Ray A. Perlner; Daniel C. Smith-Tone; Tsuyoshi Takagi; Jeremy Vates

In 2016, Yasuda et al. presented a new multivariate encryption technique based on the Square and Rainbow primitives and utilizing the plus modifier that they called SRP. The scheme achieved a smaller blow-up factor between the plaintext space and ciphertext space than most recent multivariate encryption proposals, but proved to be too aggressive and was completely broken by Perlner et al. in 2017. The scheme suffered from the same MinRank weakness that has allowed effective attacks on several notable big field multivariate schemes: HFE, multi-HFE, HFE-, for example.

Collaboration


Dive into the Daniel C. Smith-Tone's collaboration.

Top Co-Authors

Avatar

Ray A. Perlner

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Dustin Moody

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeremy Vates

University of Louisville

View shared research outputs
Top Co-Authors

Avatar

Jintai Ding

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar

Rene C. Peralta

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Ryann Cartor

University of Louisville

View shared research outputs
Top Co-Authors

Avatar

Yi-Kai Liu

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Souradyuti Paul

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge