Abstract
In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We propose a new polynomial time attack, which recovers an alternative private key. Our attack is applicable to all variants proposed so far and breaks some of them completely.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Berger, T.P., Loidreau, P.: How to mask the structure of codes for a cryptographic use. Designs, Codes and Cryptography 35(1) (2005)
Berger, T.P., Loidreau, P.: Security of the Niederreiter form of the GPT public-key cryptosystem. In: IEEE International Symposium on Information Theory, Lausanne, Suisse. IEEE, Los Alamitos (2002)
Gabidulin, E.M., Ourivski, A.V.: Column scrambler for the GPT cryptosystem. Discrete Applied Mathematics 128(1), 207–221 (2003)
Gabidulin, E.M.: On public-key cryptosystems based on linear codes. In: Proc. of 4th IMA Conference on Cryptography and Coding 1993, Codes and Ciphers. IMA Press (1995)
Gabidulin, E.M., Loidreau, P.: Subfield subcodes of maximum-rank distance codes. In: Seventh International Workshop on Algebraic and Combinatorial Coding Theory. ACCT, vol. 7, pp. 151–156 (2000)
Gabidulin, E.M., Ourivski, A.V., Honary, B., Ammar, B.: Reducible rank codes and their applications to cryptography. IEEE Transactions on Information Theory 49(12), 3289–3293 (2003)
Gabidulin, E.M., Paramonov, A.V., Tretjakov, O.V.: Ideals over a non-commutative ring and their applications to cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 482–489. Springer, Heidelberg (1991)
Gibson, K.: The security of the Gabidulin public key cryptosystem. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 212–223. Springer, Heidelberg (1996)
Johansson, T., Ourivski, A.V.: New technique for decoding codes in the rank metric and its cryptography applications. Problems of Information Transmission 38(3), 237–246 (2002)
Ourivski, A.V.: Recovering a parent code for subcodes of maximal rank distance codes. In: Proc. of WCC 2003, pp. 357–363 (2003)
Overbeck, R.: Extending Gibson’s attacks on the GPT cryptosystem. In: Proc. of WCC 2005, pp. 382–391 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Overbeck, R. (2005). A New Structural Attack for GPT and Variants. In: Dawson, E., Vaudenay, S. (eds) Progress in Cryptology – Mycrypt 2005. Mycrypt 2005. Lecture Notes in Computer Science, vol 3715. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554868_5
Download citation
DOI: https://doi.org/10.1007/11554868_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28938-8
Online ISBN: 978-3-540-32066-1
eBook Packages: Computer ScienceComputer Science (R0)