Abstract
We give polynomial time attacks on the McEliece public key cryptosystem-based either on algebraic geometry (AG) codes or on small co-dimensional subcodes of AG codes. These attacks consist in the blind reconstruction either of an error correcting pair (ECP), or an error correcting array (ECA) from the single data of an arbitrary generator matrix of a code. An ECP provides a decoding algorithm, that corrects up to $(({d^{∗}-1-g})/{2})$ errors, where $d^{∗}$ denotes the designed distance and $g$ denotes the genus of the corresponding curve, while with an ECA the decoding algorithm corrects up to $(({d^{∗}-1})/{2})$ errors. Roughly speaking, for a public code of length $n$ over $ \mathbb {F}-{q}$ , these attacks run in $O(n^{4}\log (n))$ operations in $\mathbb F-{q}$ for the reconstruction of an ECP and $O(n^{5})$ operations for the reconstruction of an ECA. A probabilistic shortcut allows to reduce the complexities respectively to $O(n^{3+\varepsilon } \log (n))$ and $O(n^{4+\varepsilon })$. Compared with the previous known attack due to Faure and Minder, our attack is efficient on codes from curves of arbitrary genus. Furthermore, we investigate how far these methods apply to subcodes of AG codes.
| Original language | English |
|---|---|
| Article number | 7942048 |
| Pages (from-to) | 5404-5418 |
| Number of pages | 15 |
| Journal | IEEE Transactions on Information Theory |
| Volume | 63 |
| Issue number | 8 |
| DOIs | |
| Publication status | Published - 1 Aug 2017 |
| Externally published | Yes |
Keywords
- Algebraic geometry codes
- Error-correcting pair
- Mceliece public key cryptosystem
Fingerprint
Dive into the research topics of 'Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver