Abstract

Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric cryptosystems. In particular, both correcting an error-affected codeword, and deriving the error vector corresponding to a given syndrome were proven to be equally difficult tasks. Since the pioneering work of Eugene Prange in the early 1960s, a significant research effort has been put into finding more efficient methods to solve the random code decoding problem through a family of algorithms known as information set decoding. The obtained improvements effectively reduce the overall complexity, which was shown to decrease asymptotically at each optimization, while remaining substantially exponential in the number of errors to be either found or corrected. In this work, we provide a comprehensive survey of the information set decoding techniques, providing finite regime temporal and spatial complexities for them. We exploit these formulas to assess the effectiveness of the asymptotic speedups obtained by the improved information set decoding techniques when working with code parameters relevant for cryptographic purposes. We also delineate computational complexities taking into account the achievable speedup via quantum computers and similarly assess such speedups in the finite regime. To provide practical grounding to the choice of cryptographically relevant parameters, we employ as our validation suite the ones chosen by cryptosystems admitted to the second round of the ongoing standardization initiative promoted by the US National Institute of Standards and Technology.

Highlights

  • Asymmetric cryptosystems are traditionally built on a mathematical function which is hard to compute unless the knowledge of a special parameter is available

  • As we show in the following, the work factor of a Message Recovery Attack (MRA) performed through Information Set Decoding (ISD) may depend on the system parameters; to this end, we first exploit the following well-known result

  • We provide finite regime expressions to estimate both the computational demand and the space requirements of the different Information Set Decoding (ISD) alternatives

Read more

Summary

Introduction

Asymmetric cryptosystems are traditionally built on a mathematical function which is hard to compute unless the knowledge of a special parameter is available. McEliece himself proposed to disguise an efficiently decodable code as a random code and employ the knowledge of the efficiently decodable representation as the private key of an asymmetric cryptosystem. ISD attempts at finding enough error-free locations in a codeword to be able to decode it regardless of the errors which affect the codeword itself Such a technique was first proposed by Prange [10] as a more efficient alternative to decode a general linear block code, with respect to a straightforward guess on the error affected locations. The works analyze the asymptotic speedup as a function of the code length alone While this approach is effective in showing an improvement in the running time of the ISD in principle, the practical relevance of the improvement when considering useful parameter sizes in cryptography may be less significant. A comprehensive source of this type is not available in the literature, to the best of our knowledge

Contributions
Paper Organization
Background on Computationally Intractable Coding Theory Problems
Applications to Cryptography
Strategies to Perform MRA
A Finite Regime Analysis of Information Set Decoding Techniques
Prange
Lee–Brickell
Adapting Lee and Brickell to Solve CFP
Finiasz–Sendrier
May–Meurer–Thomae
Becker–Joux–May–Meurer
Speedups in ISD Algorithms Due to Quasi-Cyclic Codes
3.10. Speedups from Quantum Computing
Quantitative Assessment of ISD Complexities
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.