TY - GEN
T1 - On the Structure of the Schur Squares of Twisted Generalized Reed-Solomon Codes and Application to Cryptanalysis
AU - Couvreur, Alain
AU - Pratihar, Rakhi
AU - Tanısalı, Nihan
AU - Zappatore, Ilaria
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
PY - 2025/1/1
Y1 - 2025/1/1
N2 - Twisted generalized Reed-Solomon (TGRS) codes constitute an interesting family of evaluation codes, containing a large class of maximum distance separable codes non-equivalent to generalized Reed-Solomon (GRS) ones. Moreover, the Schur squares of TGRS codes may be much larger than those of GRS codes with same dimension. Exploiting these structural differences, in 2018, Beelen, Bossert, Puchinger and Rosenkilde proposed a subfamily of Maximum Distance Separable (MDS) Twisted Reed–Solomon (TRS) codes over Fq with ℓ twists q≈n2ℓ for McEliece encryption, claiming their resistance to both Sidelnikov Shestakov attack and Schur products–based attacks. In short, they claimed these codes to resist to classical key recovery attacks on McEliece encryption scheme instantiated with Reed-Solomon (RS) or GRS codes. In 2020, Lavauzelle and Renner presented an original attack on this system based on the computation of the subfield subcode of the public TRS code. In this paper, we show that the original claim on the resistance of TRS and TGRS codes to Schur products based–attacks is wrong. We identify a broad class of codes including TRS and TGRS ones that is distinguishable from random by computing the Schur square of some shortening of the code. Then, we focus on the case of single twist (i.e., ℓ=1), which is the most efficient one in terms of decryption complexity, to derive an attack. The technique is similar to the distinguisher-based attacks of RS code-based systems given by Couvreur, Gaborit, Gauthier-Umaña, Otmani, Tillich in 2014.
AB - Twisted generalized Reed-Solomon (TGRS) codes constitute an interesting family of evaluation codes, containing a large class of maximum distance separable codes non-equivalent to generalized Reed-Solomon (GRS) ones. Moreover, the Schur squares of TGRS codes may be much larger than those of GRS codes with same dimension. Exploiting these structural differences, in 2018, Beelen, Bossert, Puchinger and Rosenkilde proposed a subfamily of Maximum Distance Separable (MDS) Twisted Reed–Solomon (TRS) codes over Fq with ℓ twists q≈n2ℓ for McEliece encryption, claiming their resistance to both Sidelnikov Shestakov attack and Schur products–based attacks. In short, they claimed these codes to resist to classical key recovery attacks on McEliece encryption scheme instantiated with Reed-Solomon (RS) or GRS codes. In 2020, Lavauzelle and Renner presented an original attack on this system based on the computation of the subfield subcode of the public TRS code. In this paper, we show that the original claim on the resistance of TRS and TGRS codes to Schur products based–attacks is wrong. We identify a broad class of codes including TRS and TGRS ones that is distinguishable from random by computing the Schur square of some shortening of the code. Then, we focus on the case of single twist (i.e., ℓ=1), which is the most efficient one in terms of decryption complexity, to derive an attack. The technique is similar to the distinguisher-based attacks of RS code-based systems given by Couvreur, Gaborit, Gauthier-Umaña, Otmani, Tillich in 2014.
KW - Code-based Cryptography
KW - Cryptanalysis
KW - McEliece encryption scheme
KW - Schur products
KW - Twisted generalised Reed-Solomon codes
UR - https://www.scopus.com/pages/publications/105002011449
U2 - 10.1007/978-3-031-86599-2_1
DO - 10.1007/978-3-031-86599-2_1
M3 - Conference contribution
AN - SCOPUS:105002011449
SN - 9783031865985
T3 - Lecture Notes in Computer Science
SP - 3
EP - 34
BT - Post-Quantum Cryptography - 16th International Workshop, PQCrypto 2025, Proceedings
A2 - Niederhagen, Ruben
A2 - Saarinen, Markku-Juhani O.
PB - Springer Science and Business Media Deutschland GmbH
T2 - 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
Y2 - 8 April 2025 through 10 April 2025
ER -