2009 IEEE International Symposium on Information Theory 2009
DOI: 10.1109/isit.2009.5206029
|View full text |Cite
|
Sign up to set email alerts
|

On improving security of GPT cryptosystems

Abstract: The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were published, including Gibson's attacks and more recently Overbeck's attacks. A few modifications were proposed withstanding Gibson's attack but at least one of them was broken by the… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(43 citation statements)
references
References 10 publications
(14 reference statements)
0
43
0
Order By: Relevance
“…Overbeck's attack failed in this case. In 2009 [10], a proper choice of column scramblers over the extension field was taken to other variants of the GPT cryptosystem. This choice withstood both Gibson's and Overbeck's attacks.…”
Section: Gibson's Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Overbeck's attack failed in this case. In 2009 [10], a proper choice of column scramblers over the extension field was taken to other variants of the GPT cryptosystem. This choice withstood both Gibson's and Overbeck's attacks.…”
Section: Gibson's Attackmentioning
confidence: 99%
“…The hexi GPT public key cryptosystem makes use of the hexi Maximum Rank Distance code for the generator matrix G in the public key G ′ , and for S a proper choice of column scramblers over the extension field is taken as in [10]. Since hexi MRD codes are analogous to MRD codes, these are a special case of MRD codes where q = 2 4 , these codes have the same error correcting capacity.…”
Section: Hexi Gpt Cryptosystemmentioning
confidence: 99%
See 1 more Smart Citation
“…Several works then proposed to resist to this attack either by taking special random codes R so that the second property is not true as in [Loi10,RGH10], or by taking a column scrambler matrix defined over the extension field F q m as in [Gab08,GRH09,RGH11].…”
Section: Introductionmentioning
confidence: 99%
“…But recently in [OTKN16] it was shown that even if the column scrambler is defined on the extension field as in [Gab08,GRH09,RGH11], by using precisely Overbeck's technique, it is still possible to recover very efficiently a secret Gabidulin code whose error correction t * is certainly strictly less than the error correction of the secret original Gabidiulin code but still strictly greater than the number of added errors t pub . In other words, an attacker is still able to decrypt any ciphertext and consequently, all schemes based on Gabidulin codes presented in [Gab08, GRH09, RGH11] are actually not secure.…”
Section: Introductionmentioning
confidence: 99%