Weak keys for the quasi-cyclic MDPC public key encryption scheme

12Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We analyze a new key recovery attack against the Quasi- Cyclic MDPC McEliece scheme. Retrieving the secret key from the public data is usually tackled down using exponential time algorithms aiming to recover minimum weight codewords and thus constructing an equivalent code. We use here a different approach and give under certain hypothesis an algorithm that is able to solve a key equation relating the public key to the private key. We relate this equation to a well known problem the Rational Reconstruction Problem and therefore propose a natural solution based on the extended Euclidean algorithm. All private keys satisfying the hypothesis are declared weak keys. In the same time we give a precise number of weak keys and extend our analysis by considering all possible cyclic shifts on the private keys. This task is accomplished using combinatorial objects like Lyndon words. We improve our approach by using a generalization of the Frobenius action which enables to increase the proportion of weak keys. Lastly, we implement the attack and give the probability to draw a weak key for all the security parameters proposed by the designers of the scheme.

Cite

CITATION STYLE

APA

Bardet, M., Dragoi, V., Luque, J. G., & Otmani, A. (2016). Weak keys for the quasi-cyclic MDPC public key encryption scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9646, pp. 346–367). Springer Verlag. https://doi.org/10.1007/978-3-319-31517-1_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free