The Method of Four Russians
As we’ve seen throughout this text, solving a linear system of GF(2) equations lies at the heart of many cryptanalytic techniques. Some examples include stream cipher cryptanalysis via the XL algorithm and its many variants [22, 23, 24, 25, 66, 67, 69, 79, 134, 82]; the algebraic attacks on the HFE public-key cryptosystem and Quartz [65, 111, 78, 72, 77, 68, 70]; cryptanalysis of QUAD ; and solving the matrix square root (provably NP-Hard for matrices over the boolean semiring) with the XL algorithm .
KeywordsBasis Vector Matrix Multiplication Gaussian Elimination Gray Code Vector Addition
Unable to display preview. Download preview PDF.