2016
DOI: 10.1109/tit.2015.2511786
|View full text |Cite
|
Sign up to set email alerts
|

On the Complexity of the Rank Syndrome Decoding Problem

Abstract: Abstract. In this paper we propose two new generic attacks on the Rank Syndrome Decoding (RSD) problem Let C be a random [n, k] rank code over GF (q m ) and let y = x + e be a received word such that x ∈ C and the Rank(e) = r. The first attack is combinatorial and permits to recover an error e of rank weight r in min. This attack dramatically improves on previous attack by introducing the length n of the code in the exponent of the complexity, which was not the case in previous generic attacks. which can be co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
114
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 98 publications
(128 citation statements)
references
References 34 publications
1
114
0
Order By: Relevance
“…For the rank metric, some complexity results were obtained more recently in [13], emphasizing the difficulty of ML decoding. This potential hardness was also corroborated by the existing practical complexities of the generic rank metric decoding algorithms [12].…”
Section: Introductionmentioning
confidence: 58%
See 1 more Smart Citation
“…For the rank metric, some complexity results were obtained more recently in [13], emphasizing the difficulty of ML decoding. This potential hardness was also corroborated by the existing practical complexities of the generic rank metric decoding algorithms [12].…”
Section: Introductionmentioning
confidence: 58%
“…In the security evaluations, this polynomial is often neglected and only the exponential term is taken into account. Note that in the case where m > n there might be a better combinatorial bound [12]. Since we do not address this setting, we do not consider this case.…”
Section: Gabidulin Codes and Channel Modelmentioning
confidence: 99%
“…We have also seen that taking w > u u+1 (n − k) implies to choose t pub < 1 2 n−k u+1 which exposes further the system to general decoding attacks like [GRS16]. Hence it imposes to increase the key sizes and consequently reduces the practicability of the scheme while offering no assurance that the scheme is still secure.…”
Section: Resultsmentioning
confidence: 99%
“…For all the proposed parameters it holds the condition k < (r+1)(k+1)−(n+1) r , so the algebraic attack of [21] must be taken into consideration while evaluating the security. 6 Key and signature size comparison…”
Section: Parameters Choicementioning
confidence: 99%