dc.creator | Couvreur, Alain | |
dc.creator | Gaborit, Philippe | |
dc.creator | Gauthier-Umaña, Valérie | |
dc.creator | Otmani, Ayoub | |
dc.creator | Tillich, Jean-Pierre | |
dc.date.accessioned | 2020-05-26T00:05:58Z | |
dc.date.accessioned | 2022-09-22T14:09:22Z | |
dc.date.available | 2020-05-26T00:05:58Z | |
dc.date.available | 2022-09-22T14:09:22Z | |
dc.date.created | 2020-05-26T00:05:58Z | |
dc.identifier | 09251022 | |
dc.identifier | 15737586 | |
dc.identifier | https://repository.urosario.edu.co/handle/10336/23845 | |
dc.identifier | https://doi.org/10.1007/s10623-014-9967-z | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/3436283 | |
dc.description.abstract | Because of their interesting algebraic properties, several authors promote the use of generalized Reed-Solomon codes in cryptography. Niederreiter was the first to suggest an instantiation of his cryptosystem with them but Sidelnikov and Shestakov showed that this choice is insecure. Wieschebrink proposed a variant of the McEliece cryptosystem which consists in concatenating a few random columns to a generator matrix of a secretly chosen generalized Reed-Solomon code. More recently, new schemes appeared which are the homomorphic encryption scheme proposed by Bogdanov and Lee, and a variation of the McEliece cryptosystem proposed by Baldi et al. which hides the generalized Reed-Solomon code by means of matrices of very low rank. In this work, we show how to mount key-recovery attacks against these public-key encryption schemes. We use the concept of distinguisher which aims at detecting a behavior different from the one that one would expect from a random code. All the distinguishers we have built are based on the notion of component-wise product of codes. It results in a powerful tool that is able to recover the secret structure of codes when they are derived from generalized Reed-Solomon codes. Lastly, we give an alternative to Sidelnikov and Shestakov attack by building a filtration which enables to completely recover the support and the non-zero scalars defining the secret generalized Reed-Solomon code. © 2014 Springer Science+Business Media New York. | |
dc.language | eng | |
dc.publisher | Kluwer Academic Publishers | |
dc.relation | Designs, Codes, and Cryptography, ISSN:09251022, 15737586, Vol.73, No.2 (2014); pp. 641-666 | |
dc.relation | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84905217777&doi=10.1007%2fs10623-014-9967-z&partnerID=40&md5=2d3741ccd9d58ebce49f8a5319179270 | |
dc.relation | 666 | |
dc.relation | No. 2 | |
dc.relation | 641 | |
dc.relation | Designs, Codes, and Cryptography | |
dc.relation | Vol. 73 | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.rights | Abierto (Texto Completo) | |
dc.source | instname:Universidad del Rosario | |
dc.source | reponame:Repositorio Institucional EdocUR | |
dc.title | Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes | |
dc.type | article | |