[Resource Topic] 2023/1535: A Total Break of the 3WISE Digital Signature Scheme

Welcome to the resource topic for 2023/1535

Title:
A Total Break of the 3WISE Digital Signature Scheme

Authors: Daniel Smith-Tone

Abstract:

A new batch of ``complete and proper’’ digital signature scheme submissions has recently been published by NIST as part of its process for establishing post-quantum cryptographic standards. This note communicates an attack on the 3WISE digital signature scheme that the submitters did not wish to withdraw after NIST communicated it to them.

While the 3WISE digital signature scheme is based on a collection of cubic maps which are naturally modeled as symmetric 3-tensors and 3-tensor rank is a difficult problem, the multivariate signature scheme is still vulnerable to MinRank attacks upon projection. We are able to break the NIST security level I parameters within a few seconds. Since the attack is polynomial time, there is no reparametrization resulting in a secure scheme.

ePrint: https://eprint.iacr.org/2023/1535

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .