A new approach based on quadratic forms to attack the McEliece cryptosystem

06/17/2023
by   Alain Couvreur, et al.
0

We bring in here a novel algebraic approach for attacking the McEliece cryptosystem. It consists in introducing a subspace of matrices representing quadratic forms. Those are associated with quadratic relationships for the component-wise product in the dual of the code used in the cryptosystem. Depending on the characteristic of the code field, this space of matrices consists only of symmetric matrices or skew-symmetric matrices. This matrix space is shown to contain unusually low-rank matrices (rank 2 or 3 depending on the characteristic) which reveal the secret polynomial structure of the code. Finding such matrices can then be used to recover the secret key of the scheme. We devise a dedicated approach in characteristic 2 consisting in using a Gröbner basis modeling that a skew-symmetric matrix is of rank 2. This allows to analyze the complexity of solving the corresponding algebraic system with Gröbner bases techniques. This computation behaves differently when applied to the skew-symmetric matrix space associated with a random code rather than with a Goppa or an alternant code. This gives a distinguisher of the latter code family. We give a bound on its complexity which turns out to interpolate nicely between polynomial and exponential depending on the code parameters. A distinguisher for alternant/Goppa codes was already known [FGO+11]. It is of polynomial complexity but works only in a narrow parameter regime. This new distinguisher is also polynomial for the parameter regime necessary for [FGO+11] but contrarily to the previous one is able to operate for virtually all code parameters relevant to cryptography. Moreover, we use this matrix space to find a polynomial time attack of the McEliece cryptosystem provided that the Goppa code is distinguishable by the method of [FGO+11] and its degree is less than q-1, where q is the alphabet size of the code.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/28/2023

Polynomial time attack on high rate random alternant codes

A long standing open question is whether the distinguisher of high rate ...
research
07/14/2020

Extending Coggia-Couvreur Attack on Loidreau's Rank-metric Cryptosystem

A recent paper by Coggia and Couvreur presents a polynomial time key-rec...
research
12/31/2021

Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes

This paper presents a key recovery attack on the cryptosystem proposed b...
research
11/13/2020

On symmetric and Hermitian rank distance codes

Let M denote the set S_n, q of n × n symmetric matrices with entries in ...
research
06/13/2018

Stability and complexity of mixed discriminants

We show that the mixed discriminant of n positive semidefinite n × n rea...
research
05/03/2016

Determinantal sets, singularities and application to optimal control in medical imagery

Control theory has recently been involved in the field of nuclear magnet...

Please sign up or login with your details

Forgot password? Click here to reset