Skip to main content
Log in

Improved Information Set Decoding Algorithms over Galois Ring in the Lee Metric

  • Published:
Journal of Systems Science and Complexity Aims and scope Submit manuscript

Abstract

The security of most code-based cryptosystems relies on the hardness of the syndrome decoding (SD) problem. The best solvers of the SD problem are known as information set decoding (ISD) algorithms. Recently, Weger, et al. (2020) described Stern’s ISD algorithm, s-blocks algorithm and partial Gaussian elimination algorithms in the Lee metric over an integer residue ring \({{\boldsymbol{Z}}_{{p^m}}}\), where p is a prime number and m is a positive integer, and analyzed the time complexity. In this paper, the authors apply a binary ISD algorithm in the Hamming metric proposed by May, et al. (2011) to solve the SD problem over the Galois ring GR(pm, k) endowed with the Lee metric and provide a detailed complexity analysis. Compared with Stern’s algorithm over \({{\boldsymbol{Z}}_{{p^m}}}\) in the Lee metric, the proposed algorithm has a significant improvement in the time complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. McEliece R J, A public-key cryptosystem based on algebraic coding theory, Jet Propulsion Laboratory DSN Progress Report, 1978, 114–116.

  2. Niederreiter H, Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory, 1986, 15(2): 159–166.

    MathSciNet  MATH  Google Scholar 

  3. Berlekamp E, McEliece R, and van Tilborg H, On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, 1978, 24(3): 384–386.

    Article  MathSciNet  MATH  Google Scholar 

  4. Barg S, Some new NP-complete coding problems, Problemy Peredachi Informatsii, 1994, 30(3): 23–28.

    MathSciNet  MATH  Google Scholar 

  5. Gaborit P and Zémor G, On the hardness of the decoding and the minimum distance problems for rank codes, IEEE Transactions on Information Theory, 2016, 62(12): 7245–7252.

    Article  MathSciNet  MATH  Google Scholar 

  6. Weger V, Khathuria K, Horlemann A-L, et al., On the hardness of the Lee syndrome decoding problem, CoRR, Vol. abs/2002.12785, 2020, https://arxiv.org/pdf/2002.12785.pdf.

  7. Prange E, The use of information sets in decoding cyclic codes, IRE Transactions, 1962, 8(5): 5–9.

    MathSciNet  Google Scholar 

  8. Lee P and Brickell E, An observation on the security of McEliece’s public-key cryptosystem, Advances in Cryptology — EUROCRYPT’88, Workshop on the Theory and Application of of Cryptographic Techniques (Ed. by Gunther C G), Davos, 1988.

  9. Stern J, A method for finding codewords of small weight, Coding Theory and Applications, 3rd International Colloquium (Eds. by Cohen G D and Wolfmann J), Toulon, 1988.

  10. May A, Meurer A, and Thomae E, Decoding random linear codes in \({\cal O}({2^{0.054n}})\), Advances in Cryptology - ASIACRYPT 2011–17th International Conference on the Theory and Application of Cryptology and Information Security (Eds. by Lee D H and Wang X), Seoul, 2011.

  11. Baldi M, Barenghi A, Chiaraluce F, et al., A finite regime analysis of information set decoding algorithms, Algorithms, 2019, 12(10): 209.

    Article  MathSciNet  Google Scholar 

  12. Becker A, Joux A, May A, et al., Decoding random binary linear codes in 2(n/20): How 1 + 1 = 0 improves information set decoding, Advances in Cryptology - EUROCRYPT 2012–31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eds. by Pointcheval D and Johansson T), Cambridge, 2012.

  13. Bernstein D J, Lange T, and Peters C, Attacking and defending the McEliece cryptosystem, Post-Quantum Cryptography, 2nd International Workshop (Eds. by Buchmann J and Ding J), Cincinnati, 2008.

  14. Bernstein D J, Lange T, and Peters C, Smaller decoding exponents: Ball-collision decoding, Advances in Cryptology - CRYPTO 2011–31st Annual Cryptology Conference (Ed. by Rogaway P), Santa Barbara, 2011.

  15. Canteaut A and Chabaud F, A new algorithm for finding minimum-weight words in a linear code: Application to McEliece’s cryptosystem and to narrow-sense BCH codes of length 511, IEEE Transactions on Information Theory, 1998, 44(1): 367–378.

    Article  MathSciNet  MATH  Google Scholar 

  16. Canteaut A and Sendrier N, Cryptanalysis of the original McEliece cryptosystem, Advances in Cryptology - ASIACRYPT’98, International Conference on the Theory and Applications of Cryptology and Information Security (Eds. Ohta K and Pei D), Beijing, 1998.

  17. Chabaud F, Asymptotic analysis of probabilistic algorithms for finding short codewords, Eurocode 92, Springer Vienna, 1993, 175–183.

  18. Courtois N T, Finiasz M, and Sendrier N, How to achieve a McEliece-based digital signature scheme, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security (Ed. by Boyd C), Gold Coast, 2001.

  19. Dumer I I, Two decoding algorithms for linear codes, Problemy Peredachi Informatsii, 1989, 25(1): 24–32.

    MathSciNet  MATH  Google Scholar 

  20. Dumer I I, On minimum distance decoding of linear codes, Proceedings 5th Joint Soviet-Swedish Int. Workshop Inform. Theory, 1991.

  21. Finiasz M and Sendrier N, Security bounds for the design of code-based cryptosystems, Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security (Ed. by Matsui M), Tokyo, 2009.

  22. John T C and Rodney M G, The complexity of information set decoding, IEEE Transactions on Information Theory, 1990, 36(5): 1031–1037.

    Article  MathSciNet  MATH  Google Scholar 

  23. Lahr N, Niederhagen R, Petri R, et al., Side channel information set decoding using iterative chunking, Advances in Cryptology - ASIACRYPT 2020–26th International Conference on the Theory and Application of Cryptology and Information Security (Eds. by Moriai S and Wang H), Daejeon, 2020.

  24. Leon J S, A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, 1988, 34(5): 1354–1359.

    Article  MathSciNet  MATH  Google Scholar 

  25. May A and Ozerov I, On computing nearest neighbors with applications to decoding of binary linear codes, Advances in Cryptology - EUROCRYPT 2015–34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eds. by Oswald E and Fischlin M), Sofia, 2015.

  26. Tilburg J V, On the McEliece public-key cryptosystem, Advances in Cryptology - CRYPTO’88, 8th Annual International Cryptology Conference (Ed. by Goldwasser S), Santa Barbara, 1988.

  27. Torres R C and Sendrier N, Analysis of information set decoding for a sub-linear error weight, Post-Quantum Cryptography — 7th International Workshop, PQCrypto 2016 (Ed. by Takagi T), Fukuoka, 2016.

  28. Sendrier N, Decoding one out of many, Post-Quantum Cryptography — 4th International Workshop, PQCrypto 2011 (Ed. by Yang B), Taipei, 2011.

  29. Peters C, Information-set decoding for linear codes over Fq, Post-Quantum Cryptography, 3rd International Workshop, PQCrypto 2010 (Ed. by Sendrier N), Darmstadt, 2010.

  30. Gueye C T, Klamti J B, and Hirose S, Generalization of BJMM-ISD using May-Ozerov nearest neighbor algorithm over an arbitrary finite field Fq, Codes, Cryptology and Information Security - 2nd International Conference, C2SI 2017 (Eds. by Hajji S E, Nitaj A, and Souidi E M), Rabat, 2017.

  31. Hirose S, May-Ozerov algorithm for nearest-neighbor problem over Fq and its application to information set decoding, Innovative Security Solutions for Information Technology and Communications — 9th International Conference, SECITC 2016 (Eds. by Bica I and Reyhanitabar R), Bucharest, 2016.

  32. Interlando C, Khathuria K, Rohrer N, et al., Generalization of the ball-collision algorithm, CoRR, Vol. abs/1812.10955, 2018, https://arxiv.org/abs/1812.10955.

  33. Niebuhr R, Persichetti E, Cayrel P, et al., On lower bounds for information set decoding over Fq and on the effect of partial knowledge, International Journal of Information and Coding Theory, 2017, 4(1): 47–78.

    Article  MathSciNet  MATH  Google Scholar 

  34. Bricout R, Chailloux A, Debris-Alazard T, et al., Ternary syndrome decoding with large weight, Selected Areas in Cryptography - SAC 2019–26th International Conference (Eds. by Paterson K G and Stebila D), Waterloo, 2019.

  35. Cayrel P, Véron P, and Alaoui S M E Y, A zero-knowledge identification scheme based on the q-ary syndrome decoding problem, Selected Areas in Cryptography - 17th International Workshop, SAC 2010 (Eds. by Biryukov A, Gong G, and Stinson D R), Waterloo, 2010.

  36. Stern J, A new identification scheme based on syndrome decoding, Advances in Cryptology - CRYPTO’93, 13th Annual International Cryptology Conference (Ed. by Stinson D R), Santa Barbara, 1993.

  37. Véron P, Improved identification schemes based on error-correcting codes, Applicable Algebra in Engineering, Communication and Computing, 1997, 8(1): 57–69.

    Article  MathSciNet  MATH  Google Scholar 

  38. Horlemann-Trautmann A and Weger V, Information set decoding in the Lee metric with applications to cryptography, Advances in Mathematics of Communications, 2021, 15(4): 677–699.

    Article  MathSciNet  MATH  Google Scholar 

  39. Weger V, Battaglioni M, Santini P, et al., Information set decoding of Lee-metric codes over finite rings, CoRR, Vol. abs/2001.08425, 2020, https://arxiv.org/abs/2001.08425

  40. Roth R, Introduction to Coding Theory, Cambridge University Press, Cambridge, 2006.

    Book  MATH  Google Scholar 

  41. Abramson M, Restricted combinations and compositions, Fibonacci Quart, 1976: 439–452.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li-Ping Wang.

Additional information

This research was supported by the National Natural Science Foundation of China under Grant No. 61872355 and the National Key Research and Development Program of China under Grant No. 2018YFA0704703.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Y., Wang, LP. Improved Information Set Decoding Algorithms over Galois Ring in the Lee Metric. J Syst Sci Complex 36, 1319–1335 (2023). https://doi.org/10.1007/s11424-023-1512-6

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11424-023-1512-6

Keywords

Navigation