2020
DOI: 10.1007/978-3-030-45727-3_3
|View full text |Cite
|
Sign up to set email alerts
|

An Algebraic Attack on Rank Metric Code-Based Cryptosystems

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
68
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 50 publications
(70 citation statements)
references
References 39 publications
2
68
0
Order By: Relevance
“…This family of attacks consists in modeling the decoding problem into a system of multivariate polynomial equations and then solve this system. In [11], the constructed system was solved by using Gröbner basis techniques. Similar approaches exist for solving the MinRank problem, such as the Kipnis-Shamir modeling [28] and the minors modeling (described for example in [19]); the complexity of solving MinRank using these modelings has been investigated in [18,19].…”
Section: Problem 2 (Minrank Problem)mentioning
confidence: 99%
See 2 more Smart Citations
“…This family of attacks consists in modeling the decoding problem into a system of multivariate polynomial equations and then solve this system. In [11], the constructed system was solved by using Gröbner basis techniques. Similar approaches exist for solving the MinRank problem, such as the Kipnis-Shamir modeling [28] and the minors modeling (described for example in [19]); the complexity of solving MinRank using these modelings has been investigated in [18,19].…”
Section: Problem 2 (Minrank Problem)mentioning
confidence: 99%
“…Our contribution. In this paper, we follow on from the approach in [11] and propose a slightly different modeling to solve the RD problem. This system can be solved "directly" by linearization, avoiding the use of Gröbner basis algorithms such as Faugère's F4 algorithm, see [17].…”
Section: Problem 2 (Minrank Problem)mentioning
confidence: 99%
See 1 more Smart Citation
“…Since then, new algebraic attacks have surfaced (see [40,41]) that model the decoding problem as a system of multivariate equations using equations from the extension field structure to solve. The most recent algebraic attack is more efficient than combinatorial approaches against the parameter sets given in ROLLO, resulting in a near-complete break of all three KEMS.…”
Section: Rollomentioning
confidence: 99%
“…The first-round report noted that the strength of algebraic attacks against RSD was not well understood and should be explored. Since then, new algebraic attacks have surfaced which model the decoding problem as a system of multivariate equations using equations from the extension field structure to solve [40,41]. The most recent algebraic attack is more efficient than combinatorial approaches against the parameter sets given in the round 2 specification of RQC, resulting in a near-complete break.…”
Section: Rqcmentioning
confidence: 99%