Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes

We give polynomial time attacks on the McEliece public key cryptosystem-based either on algebraic geometry (AG) codes or on small co-dimensional subcodes of AG codes. These attacks consist in the blind reconstruction either of an error correcting pair (ECP), or an error correcting array (ECA) from t...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information theory Vol. 63; no. 8; pp. 5404 - 5418
Main Authors Couvreur, Alain, Marquez-Corbella, Irene, Pellikaan, Ruud
Format Journal Article
LanguageEnglish
Published New York IEEE 01.08.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Subjects
Online AccessGet full text
ISSN0018-9448
1557-9654
1557-9654
DOI10.1109/TIT.2017.2712636

Cover

More Information
Summary:We give polynomial time attacks on the McEliece public key cryptosystem-based either on algebraic geometry (AG) codes or on small co-dimensional subcodes of AG codes. These attacks consist in the blind reconstruction either of an error correcting pair (ECP), or an error correcting array (ECA) from the single data of an arbitrary generator matrix of a code. An ECP provides a decoding algorithm, that corrects up to ((d* - 1 - g)/2) errors, where d* denotes the designed distance and g denotes the genus of the corresponding curve, while with an ECA the decoding algorithm corrects up to ((d* - 1)/2) errors. Roughly speaking, for a public code of length n over F q , these attacks run in O(n 4 log(n)) operations in F q for the reconstruction of an ECP and O(n 5 ) operations for the reconstruction of an ECA. A probabilistic shortcut allows to reduce the complexities respectively to O(n 3 ±ε log(n)) and O(n 4 ±ε). Compared with the previous known attack due to Faure and Minder, our attack is efficient on codes from curves of arbitrary genus. Furthermore, we investigate how far these methods apply to subcodes of AG codes.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0018-9448
1557-9654
1557-9654
DOI:10.1109/TIT.2017.2712636