, so we arrive at the contradiction that a polynomial
algorithm exists for NP.
5 EXTENSION UNDER NP = EXP
ASSUMPTION
For the much stronger assumption NP = EXP, the
runtime of the non-informed algorithm can be writ-
ten as θ(c
n
3
) - where c
3
is a constant - and a constant
signature size is no longer needed. Instead, one might
set the signature size as any such function of the key
graph size n that is contained in O (
n
lgn·ω(1)
). This sub-
linear function will be denoted as σ(n). We construct
the same parallel algorithm as before, which will have
a runtime
O (c
k
0
n
k
(n− k)
c
2
) = O (c
σ(n)
0
n
σ(n)
(n− σ(n))
c
2
)
= O (n
σ(n)
) = O (n
n
lgn·o(1)
)
= O ((e
n
)
1
o(1)
) = o(c
n
4
)
for any c
4
. Should we let c
3
= c
4
, we arrive at the
contradiction o(c
n
3
) = θ(c
n
3
).
This proof leads us to two conclusions: first,
even the random key generation can be made se-
cure if the key graph is large compared to the sig-
nature size, since the informed problem cannot be
solved 2
{bits o f information}
-times faster than the non-
informed variant; and second, our originally proposed
4|S| = 2|G| = |H| ratio was wrong, and |S| ≪ |G| is
necessary.
6 SUMMARY
In our paper we have shortly described the IzoSign
signature algorithm and the original key generation
algorithm that was broken by professor Miroslaw
Kutylowski (Kutylowski, 2007). We then presented
a new key generation method that is defended against
the type of attack used to break the same procedure in
the first version of the protocol; and given a proof of
the security of the random key generation for proper
parameter choices under the assumptions P 6= NP or
NP = EXP. We believethat our new key generation is
safe, however, we encourage breaking attempts in or-
der to fully understand the underlying Subgraph Iso-
morphism problem.
REFERENCES
Aaronson, S. (2008). Complexity zoo.
http://qwiki.caltech.edu/wiki/Complexity
Zoo.
Babai, L. (1995). Automorphism groups, isomorphism
reconstruction. In Graham, R., Gr¨otschel, M., and
Lov´asz, L., editors, Handbook of Combinatorics,
chapter 27, pages 1447–1540. Elsevier Science.
Babai, L., Grigoryev, D. Y., and Mount, D. M. (1982). Iso-
morphism of graphs with bounded eigenvalue multi-
plicity. In Proceedings of the Fourteenth Annual ACM
Symposium on Theory of Computing, pages 310–324.
ACM.
Cormen, T. H., Leiserson, C. E., and Rivest, R. L. (1990).
Introduction to Algorithms. MIT Press, Cambridge,
MA, USA.
Courtois, N. T., Finiasz, M., and Sendrier, N. (2001). How
to achieve a McEliece-based digital signature scheme.
In Advances in Cryptology – ASIACRYPT 2001, pages
157–174. Springer.
Courtois, N. T., Goubin, L., and Patarin, J. (2003).
SFLASHv3, a fast asymmetric signature scheme.
Cryptology ePrint Archive, Report 2003/211.
http://eprint.iacr.org/.
Dessmark, A., Lingas, A., and Proskurowski, A. (1996).
Faster algorithms for subgraph isomorphism of k-
connected partial k-trees. In European Symposium on
Algorithms, pages 501–513. Springer.
Dubois, V., Fouque, P.-A., Shamir, A., and Stern, J. (2006).
Breaking SFLASH. http://www.ecrypt.eu.org-
/webnews/webnews1206.htm#sflash.
European Parliament and Council (1999). Direc-
tive 1999/93/ec on a community framework
for electronic signatures. http://europa.eu.int-
/ISPO/legal/en/ecommerc/digsig.html,
http://www.legi-internet.ro/diresignature.htm.
Filotti, I. S. and Mayer, J. N. (1980). A polynomial time
algorithm for determining isomorphism of graphs of
fixed genus. In Proceedings of the Twelfth Annual
ACM Symposium on Theory of Computing, pages
236–243. ACM.
Gupta, A. and Nishimura, N. (1996a). Characterizing the
complexity of subgraph isomorphism for graphs of
bounded path-width. In STACS ’96: Proceedings of
the 13th Annual Symposium on Theoretical Aspects of
Computer Science, pages 453–464. Springer-Verlag.
Gupta, A. and Nishimura, N. (1996b). The complexity of
subgraph isomorphism for classes of partial k-trees.
Theoretical Computer Science, 164:287–298.
Hopcroft, J. and Tarjan, R. (1974). Efficient planarity test-
ing. Journal of the ACM, 21(4):549–568.
Ichikawa, S. and Yamamoto, S. (2002). Data dependent
circuit for subgraph isomorphism problem. In Pro-
ceedings of 12th International Conference on Field
Programmable Logic and Applications, pages 1068–
1071. Springer-Verlag.
Kutylowski, M. (2007). personal communication regarding
IzoSign algorithm.
Lingas, A. (1989). Subgraph isomorphism for biconnected
outerplanar graphs in cubic time. Theoretical Com-
puter Science, 63(3):295–302.
PROPER KEY GENERATION FOR THE IZOSIGN ALGORITHM
371