34
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We cryptanalyse here two variants of the McEliece cryptosystem based on quasi-cyclic codes. Both aim at reducing the key size by restricting the public and secret generator matrices to be in quasi-cyclic form. The first variant considers subcodes of a primitive BCH code. We prove that this variant is not secure by finding and solving a linear system satisfied by the entries of the secret permutation matrix. The other variant uses quasi-cyclic low density parity-check codes. This scheme was devised to be immune against general attacks working for McEliece type cryptosystems based on low density parity-check codes by choosing in the McEliece scheme more general one-to-one mappings than permutation matrices. We suggest here a structural attack exploiting the quasi-cyclic structure of the code and a certain weakness in the choice of the linear transformations that hide the generator matrix of the code. Our analysis shows that with high probability a parity-check matrix of a punctured version of the secret code can be recovered in cubic time complexity in its length. The complete reconstruction of the secret parity-check matrix of the quasi-cyclic low density parity-check codes requires the search of codewords of low weight which can be done with about 237 operations for the specific parameters proposed.

          Related collections

          Author and article information

          Journal
          2008-04-02
          2010-01-03
          Article
          0804.0409
          a994a917-d367-4e1c-aa8c-e1a791a98145

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          Major corrections. This version supersedes previuos ones
          cs.CR cs.DM

          Security & Cryptology,Discrete mathematics & Graph theory
          Security & Cryptology, Discrete mathematics & Graph theory

          Comments

          Comment on this article