Semilinear transformations in coding theory and their application to cryptography

07/07/2021
by   Wenshuo Guo, et al.
0

This paper presents a brand-new idea of masking the algebraic structure of linear codes used in code-based cryptography. Specially, we introduce the so-called semilinear transformations in coding theory, make a thorough study on their algebraic properties and then creatively apply them to the construction of code-based cryptosystems. Note that 𝔽_q^m can be viewed as an 𝔽_q-linear space of dimension m, a semilinear transformation φ is therefore defined to be an 𝔽_q-linear automorphism of 𝔽_q^m. After that, we impose this transformation to a linear code 𝒞 over 𝔽_q^m. Apparently φ(𝒞) forms an 𝔽_q-linear space, but generally does not preserve the 𝔽_q^m-linearity according to our analysis. Inspired by this observation, a new technique for masking the structure of linear codes is developed in this paper. Meanwhile, we endow the secret code with the so-called partial cyclic structure to make a reduction in public-key size. Compared to some other code-based cryptosystems, our proposal admits a much more compact representation of public keys. For instance, 1058 bytes are enough to reach the security of 256 bits, almost 1000 times smaller than that of the Classic McEliece entering the third round of the NIST PQC project.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2019

Code based Cryptography: Classic McEliece

This technical report addresses code-based cryptography and is designed ...
research
07/04/2021

Expanded Gabidulin Codes and Their Application to Cryptography

This paper presents a new family of linear codes, namely the expanded Ga...
research
06/02/2020

Probability theory and public-key cryptography

In this short note, we address a common misconception at the interface o...
research
01/29/2023

Rank Generalized Subsapce subcode

Rank metric codes were study by E. Gabidulin in 1985 after a brief intro...
research
08/17/2021

On computations with Double Schubert Automaton and stable maps of Multivariate Cryptography

The families of bijective transformations G_n of affine space K^n over g...
research
07/14/2020

Coding theory package for Macaulay2

In this Macaulay2 <cit.> package we define an object called linear code....
research
08/26/2019

Squeezing a vectorial nonlinear binary transformation between two perpendicular matrices

We propose a new primitive that could serve as a component in the design...

Please sign up or login with your details

Forgot password? Click here to reset