Skip to main content
Log in

On the Support Splitting Algorithm for Induced Codes

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

As shown by N. Sendrier in 2000, if a \([n{\text{,}}\,k{\text{,}}\,d]\)-linear code \(C( \subseteq \mathbb{F}_{q}^{n})\) with length \(n\), dimensionality \(k\) and code distance \(d\) has a trivial group of automorphisms \({\text{PAut}}(C)\), it allows one to construct a determined support splitting algorithm in order to find a permutation \(\sigma \) for a code \(D\), being permutation-equivalent to the code \(C\), such that \(\sigma (C) = D\). This algorithm can be used for attacking the McEliece cryptosystem based on the code\(C\). This work aims the construction and analysis of the support splitting algorithm for the code \(\mathbb{F}_{q}^{l} \otimes C\), induced by the code \(C\), \(l \in \mathbb{N}\). Since the group of automorphisms PAut\((\mathbb{F}_{q}^{l} \otimes C)\) is nontrivial even in the case of that trivial for the base code \(C\), it enables one to assume a potentially high resistance of the McEliece cryptosystem on the code \(\mathbb{F}_{q}^{l} \otimes C\) to the attack based on a carrier split. The support splitting algorithm is being constructed for the code \(\mathbb{F}_{q}^{l} \otimes C\) and its efficiency is compared with the attack to a McEliece cryptosystem based on the code \(\mathbb{F}_{q}^{l} \otimes C.\)

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. McEliece, R.J., A public-key cryptosystem based on algebraic coding theory, JPL Deep Space Network Prog. Rep., 1978, nos. 42–44, pp. 114–116.

  2. Sendrier, N. and Tillich, J.P., Code-Based Cryptography: New Security Solutions against a Quantum Adversary, ERCIM News, ERCIM, 2016. https://hal.archives-ouvertes.fr/hal-01410068/document.

  3. Morelos-Zaragoza, R.H., The Art of Error Correcting Coding, John Wiley & Sons, Inc., 2006, 2nd ed.

    Book  Google Scholar 

  4. Sidel’nikov, V.M. and Shestakov, S.O., On an encoding system constructed on the basis of generalized Reed-Solomon codes, Discrete Math. Appl., 1992, vol. 2, no. 4, pp. 439–444.

    MathSciNet  MATH  Google Scholar 

  5. Borodin, M.A. and Chizhov, I.V., Effective attack on the McEliece cryptosystem based on Reed-Muller codes, Discrete Math. Appl., 2014, vol. 24, no. 5, pp. 273–280.

    Article  MathSciNet  Google Scholar 

  6. Deundyak, V.M. and Kosolapov, Yu.V., Algorithms for majority decoding of group codes, Model. Anal. Inf. Sist., 2015, vol. 22, no. 4, pp. 464–482.

    Article  MathSciNet  Google Scholar 

  7. Deundyak, V.M. and Kosolapov, Yu.V., Cryptosystem based on induced group codes, Model. Anal. Inf. Sist., 2016, vol. 23, no. 2, pp. 137–152.

    Article  MathSciNet  Google Scholar 

  8. Sendrier, N., Finding the permutation between equivalent linear codes: The support splitting algorithm, IEEE Trans. IT, 2000, vol. 46, no. 4, pp. 1193–1203.

    Article  MathSciNet  Google Scholar 

  9. Haily, A. and Harzalla, D., On binary linear codes whose automorphism group is trivial, J. Discrete Math. Sci. Cryptogr., 2015, vol. 18, no. 5, pp. 495–512.

    Article  MathSciNet  Google Scholar 

  10. Lenstra, A.K. and Verheul, E.R., Selecting cryptographic key sizes, J. Cryptol., 2001, vol. 14, no. 4, pp. 255–293.

    Article  MathSciNet  Google Scholar 

  11. Deundyak, V.M. and Kosolapov, Yu.V., The use of the tensor product of Reed-Muller codes in asymmetric McEliece type cryptosystem and analysis of its resistance to attacks on the cryptogram, Vychisl. Tekhnol., 2017, vol. 22, no. 4, pp. 43–60.

    Google Scholar 

  12. Girault, M., A (non-practical) three-pass identification protocol using coding theory, Advances in Cryptology AUSCRYPT'90; Lect. Notes Comput. Sci., 1990, vol. 453, pp. 265–272.

    Article  Google Scholar 

  13. Sendrier, N. and Simos, D.E., The Hardness of Code Equivalence over 𝔽q and its application to code-based cryptography, Post-Quantum Cryptography. PQCrypto 2013; Lect. Notes Comput. Sci., 2013, vol. 7932, pp. 203–216.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yu. V. Kosolapov or A. N. Shigaev.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by O. Maslova

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kosolapov, Y.V., Shigaev, A.N. On the Support Splitting Algorithm for Induced Codes. Aut. Control Comp. Sci. 53, 719–729 (2019). https://doi.org/10.3103/S0146411619070125

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411619070125

Keywords: