dc.creatorCouvreur, Alain
dc.creatorGaborit, Philippe
dc.creatorGauthier-Umaña, Valérie
dc.creatorOtmani, Ayoub
dc.creatorTillich, Jean-Pierre
dc.date.accessioned2020-05-26T00:05:58Z
dc.date.accessioned2022-09-22T14:09:22Z
dc.date.available2020-05-26T00:05:58Z
dc.date.available2022-09-22T14:09:22Z
dc.date.created2020-05-26T00:05:58Z
dc.identifier09251022
dc.identifier15737586
dc.identifierhttps://repository.urosario.edu.co/handle/10336/23845
dc.identifierhttps://doi.org/10.1007/s10623-014-9967-z
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/3436283
dc.description.abstractBecause of their interesting algebraic properties, several authors promote the use of generalized Reed-Solomon codes in cryptography. Niederreiter was the first to suggest an instantiation of his cryptosystem with them but Sidelnikov and Shestakov showed that this choice is insecure. Wieschebrink proposed a variant of the McEliece cryptosystem which consists in concatenating a few random columns to a generator matrix of a secretly chosen generalized Reed-Solomon code. More recently, new schemes appeared which are the homomorphic encryption scheme proposed by Bogdanov and Lee, and a variation of the McEliece cryptosystem proposed by Baldi et al. which hides the generalized Reed-Solomon code by means of matrices of very low rank. In this work, we show how to mount key-recovery attacks against these public-key encryption schemes. We use the concept of distinguisher which aims at detecting a behavior different from the one that one would expect from a random code. All the distinguishers we have built are based on the notion of component-wise product of codes. It results in a powerful tool that is able to recover the secret structure of codes when they are derived from generalized Reed-Solomon codes. Lastly, we give an alternative to Sidelnikov and Shestakov attack by building a filtration which enables to completely recover the support and the non-zero scalars defining the secret generalized Reed-Solomon code. © 2014 Springer Science+Business Media New York.
dc.languageeng
dc.publisherKluwer Academic Publishers
dc.relationDesigns, Codes, and Cryptography, ISSN:09251022, 15737586, Vol.73, No.2 (2014); pp. 641-666
dc.relationhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84905217777&doi=10.1007%2fs10623-014-9967-z&partnerID=40&md5=2d3741ccd9d58ebce49f8a5319179270
dc.relation666
dc.relationNo. 2
dc.relation641
dc.relationDesigns, Codes, and Cryptography
dc.relationVol. 73
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightsAbierto (Texto Completo)
dc.sourceinstname:Universidad del Rosario
dc.sourcereponame:Repositorio Institucional EdocUR
dc.titleDistinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
dc.typearticle


Este ítem pertenece a la siguiente institución