Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes

作者: Ayoub Otmani , Jean-Pierre Tillich , Léonard Dallot

DOI: 10.1007/S11786-009-0015-8

关键词:

摘要: We cryptanalyse here two variants of the McEliece cryptosystem based on quasi-cyclic codes. Both aim at reducing key size by restricting public and secret generator matrices to be in form. The first variant considers subcodes a primitive BCH code. aforementioned constraint keys implies choose very structured permutations. prove that this is not secure producing many linear equations entries permutation matrix have satisfy using fact code subcode known This attack has been implemented all experiments we performed solution space system was dimension one revealed matrix. other uses low density parity-check (LDPC) scheme devised immune against general attacks working for type cryptosystems LDPC codes choosing more one-to-one mappings than matrices. suggest structural exploiting structure certain weakness choice transformations hide cryptanalysis adopts polynomial-oriented approach basically consists searching polynomials weight such their product polynomial. Our analysis shows with high probability punctured version can recovered time complexity O(n3) where n length considered complete reconstruction requires search codewords which done about 237 operations specific parameters proposed.

参考文章(23)
Christian Wieschebrink, An Attack on a Modified Niederreiter Encryption Scheme Public Key Cryptography - PKC 2006. pp. 14- 26 ,(2006) , 10.1007/11745853_2
P. J. Lee, E. F. Brickell, An observation on the security of McEliece's public-key cryptosystem theory and application of cryptographic techniques. pp. 275- 280 ,(1988) , 10.1007/3-540-45961-8_25
Jacques Stern, A method for finding codewords of small weight Proceedings of the third international colloquium on Coding theory and applications. pp. 106- 113 ,(1989) , 10.1007/BFB0019850
Richard A. Brualdi, Vera Pless, W. C. Huffman, Handbook Of Coding Theory ,(2011)
Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud, On Kabatianskii-Krouk-Smeets Signatures Arithmetic of Finite Fields. pp. 237- 251 ,(2007) , 10.1007/978-3-540-73074-3_18
Philippe Gaborit, Marc Girault, Lightweight code-based identification and signature international symposium on information theory. pp. 191- 195 ,(2007) , 10.1109/ISIT.2007.4557225
WIEB BOSMA, JOHN CANNON, CATHERINE PLAYOUST, The MAGMA algebra system I: the user language Journal of Symbolic Computation. ,vol. 24, pp. 235- 265 ,(1997) , 10.1006/JSCO.1996.0125
Marco Baldi, Franco Chiaraluce, Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes international symposium on information theory. pp. 2591- 2595 ,(2007) , 10.1109/ISIT.2007.4557609
V. M. SIDELNIKOV, S. O. SHESTAKOV, On insecurity of cryptosystems based on generalized Reed-Solomon codes Discrete Mathematics and Applications. ,vol. 2, pp. 439- 444 ,(1992) , 10.1515/DMA.1992.2.4.439
V. M. SIDELNIKOV, A public-key cryptosystem based on binary Reed-Muller codes Discrete Mathematics and Applications. ,vol. 4, pp. 191- 208 ,(1994) , 10.1515/DMA.1994.4.3.191