Abstract—
As shown by N. Sendrier in 2000, if a \([n{\text{,}}\,k{\text{,}}\,d]\)-linear code \(C( \subseteq \mathbb{F}_{q}^{n})\) with length \(n\), dimensionality \(k\) and code distance \(d\) has a trivial group of automorphisms \({\text{PAut}}(C)\), it allows one to construct a determined support splitting algorithm in order to find a permutation \(\sigma \) for a code \(D\), being permutation-equivalent to the code \(C\), such that \(\sigma (C) = D\). This algorithm can be used for attacking the McEliece cryptosystem based on the code\(C\). This work aims the construction and analysis of the support splitting algorithm for the code \(\mathbb{F}_{q}^{l} \otimes C\), induced by the code \(C\), \(l \in \mathbb{N}\). Since the group of automorphisms PAut\((\mathbb{F}_{q}^{l} \otimes C)\) is nontrivial even in the case of that trivial for the base code \(C\), it enables one to assume a potentially high resistance of the McEliece cryptosystem on the code \(\mathbb{F}_{q}^{l} \otimes C\) to the attack based on a carrier split. The support splitting algorithm is being constructed for the code \(\mathbb{F}_{q}^{l} \otimes C\) and its efficiency is compared with the attack to a McEliece cryptosystem based on the code \(\mathbb{F}_{q}^{l} \otimes C.\)
Similar content being viewed by others
REFERENCES
McEliece, R.J., A public-key cryptosystem based on algebraic coding theory, JPL Deep Space Network Prog. Rep., 1978, nos. 42–44, pp. 114–116.
Sendrier, N. and Tillich, J.P., Code-Based Cryptography: New Security Solutions against a Quantum Adversary, ERCIM News, ERCIM, 2016. https://hal.archives-ouvertes.fr/hal-01410068/document.
Morelos-Zaragoza, R.H., The Art of Error Correcting Coding, John Wiley & Sons, Inc., 2006, 2nd ed.
Sidel’nikov, V.M. and Shestakov, S.O., On an encoding system constructed on the basis of generalized Reed-Solomon codes, Discrete Math. Appl., 1992, vol. 2, no. 4, pp. 439–444.
Borodin, M.A. and Chizhov, I.V., Effective attack on the McEliece cryptosystem based on Reed-Muller codes, Discrete Math. Appl., 2014, vol. 24, no. 5, pp. 273–280.
Deundyak, V.M. and Kosolapov, Yu.V., Algorithms for majority decoding of group codes, Model. Anal. Inf. Sist., 2015, vol. 22, no. 4, pp. 464–482.
Deundyak, V.M. and Kosolapov, Yu.V., Cryptosystem based on induced group codes, Model. Anal. Inf. Sist., 2016, vol. 23, no. 2, pp. 137–152.
Sendrier, N., Finding the permutation between equivalent linear codes: The support splitting algorithm, IEEE Trans. IT, 2000, vol. 46, no. 4, pp. 1193–1203.
Haily, A. and Harzalla, D., On binary linear codes whose automorphism group is trivial, J. Discrete Math. Sci. Cryptogr., 2015, vol. 18, no. 5, pp. 495–512.
Lenstra, A.K. and Verheul, E.R., Selecting cryptographic key sizes, J. Cryptol., 2001, vol. 14, no. 4, pp. 255–293.
Deundyak, V.M. and Kosolapov, Yu.V., The use of the tensor product of Reed-Muller codes in asymmetric McEliece type cryptosystem and analysis of its resistance to attacks on the cryptogram, Vychisl. Tekhnol., 2017, vol. 22, no. 4, pp. 43–60.
Girault, M., A (non-practical) three-pass identification protocol using coding theory, Advances in Cryptology AUSCRYPT'90; Lect. Notes Comput. Sci., 1990, vol. 453, pp. 265–272.
Sendrier, N. and Simos, D.E., The Hardness of Code Equivalence over 𝔽q and its application to code-based cryptography, Post-Quantum Cryptography. PQCrypto 2013; Lect. Notes Comput. Sci., 2013, vol. 7932, pp. 203–216.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by O. Maslova
About this article
Cite this article
Kosolapov, Y.V., Shigaev, A.N. On the Support Splitting Algorithm for Induced Codes. Aut. Control Comp. Sci. 53, 719–729 (2019). https://doi.org/10.3103/S0146411619070125
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411619070125