supported by the National Natural Science Foundation of China(No.61462016,No.61562012,No.11261018);the Science and Technology Foundation of Guizhou Province(No.[2014]2125,No.[2014]2142);the Doctorial Foundation of Guizhou Normal University(No.[2014]11904-0514021);the Youth Science and Technology Talent Growth Program of Guizhou Province’s Department of Education(No.[2016]130)
This paper presents an attack on an encryption scheme proposed by Pei et al. using matrices over finite fields in 2010. The public information allows the derivation of a system of polynomial equations for the equivale...