2017
DOI: 10.1007/s10623-017-0402-0
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial-time key recovery attack on the Faure–Loidreau scheme based on Gabidulin codes

Abstract: ABSTRACT. Encryption schemes based on the rank metric lead to small public key sizes of order of few thousands bytes which represents a very attractive feature compared to Hamming metric-based encryption schemes where public key sizes are of order of hundreds of thousands bytes even with additional structures like the cyclicity. The main tool for building public key encryption schemes in rank metric is the McEliece encryption setting used with the family of Gabidulin codes. Since the original scheme proposed i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(44 citation statements)
references
References 24 publications
(33 reference statements)
0
44
0
Order By: Relevance
“…In this case, an interleaved decoder, see (2), and therefore also the attack by Gaborit et al [9] fails, see Theorem 3. One possible choice is to set z 1 = z 2 = · · · = z u with rank q (z 1 ) = rank q (z) = w. In this case ϕ = rank q m (M n−k−w,q (z 1 )) = n−k −w < w. This is true since w > n−k 2 , i.e., M n−k−w,q (z 1 ) has more linearly independent elements in the first row than rows.…”
Section: H Overbeck-like Attackmentioning
confidence: 99%
“…In this case, an interleaved decoder, see (2), and therefore also the attack by Gaborit et al [9] fails, see Theorem 3. One possible choice is to set z 1 = z 2 = · · · = z u with rank q (z 1 ) = rank q (z) = w. In this case ϕ = rank q m (M n−k−w,q (z 1 )) = n−k −w < w. This is true since w > n−k 2 , i.e., M n−k−w,q (z 1 ) has more linearly independent elements in the first row than rows.…”
Section: H Overbeck-like Attackmentioning
confidence: 99%
“…Another important distance function of coding theory is the rank metric, which measures the rank of the difference between a pair of matrices with entries from a finite field F q . Rank metric codes have seen a recent resurgence of interest both for their potential use in code based cryptography and as error-correcting codes in network communications [19,26,27,36,39,40]. They are also intriguing as mathematical objects in their own right, and several researchers have sought to describe their structural properties [1,4,7,12,13,14,20,21,25,32,35].…”
Section: Introductionmentioning
confidence: 99%
“…To defend against these attacks several variants of GPT cryptosystems are proposed as well [12][13][14][15]. There were some recent attacks on the GPT cryptosystem published in [16][17][18] but to withstand these attack recently another construction of GPT cryptosystem is proposed by Loidreau P. [19]. Although GPT cryptosystem is continuously under threats over the years.…”
Section: Introductionmentioning
confidence: 99%