Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
- 1.6k Downloads
Recently, several promising approaches have been proposed to reduce keysizes for code based cryptography using structured, but non-algebraic codes, such as quasi-cyclic (QC) Moderate Density Parity Check (MDPC) codes. Biasi et al. propose further reducing the keysizes of code-based schemes using cyclosymmetric (CS) codes. While Biasi et al. analyze the complexity of attacking their scheme using standard information-set-decoding algorithms, the research presented here shows that information set decoding algorithms can be improved, by choosing the columns of the information set in a way that takes advantage of the added symmetry. The result is an attack that significantly reduces the security of the proposed CS-MDPC schemes to the point that they no longer offer an advantage in keysize over QC-MDPC schemes of the same security level. QC-MDPC schemes are not affected by this paper’s result.
Keywordsinformation set decoding code-based cryptography moderate density parity check (MDPC) codes cyclosymmetric
Unable to display preview. Download preview PDF.
- 1.McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114–116 (1978)Google Scholar
- 5.Misoczki, R., Tillich, J.P., Sendrier, N., Barreto, P.S.L.M.: Mdpc-mceliece: New mceliece variants from moderate density parity-check codes. Cryptology ePrint Archive, Report 2012/409 (2012), http://eprint.iacr.org/
- 10.Biasi, F., Barreto, P., Misoczki, R., Ruggiero, W.: Scaling efficient code-based cryptosystems for embedded platforms. Journal of Cryptographic Engineering, 1–12 (2014)Google Scholar
- 11.Barreto, P.: Can code-based keys and cryptograms get smaller than their rsa counterparts (2012)Google Scholar
- 12.Biasi, F.P., Barreto, P.S., Misoczki, R., Ruggiero, W.V.: Scaling efficient code-based cryptosystems for embedded platforms. arXiv preprint arXiv:1212.4317 (2012)Google Scholar
- 13.Neiderreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory. Problemy Upravlenija i Teorii Informacii (15) 159–166Google Scholar