首页> 外文OA文献 >Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes
【2h】

Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes

机译:基于标识符的公钥密码系统攻击   里德 - 所罗门码

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Because of their interesting algebraic properties, several authors promotethe use of generalized Reed-Solomon codes in cryptography. Niederreiter was thefirst to suggest an instantiation of his cryptosystem with them but Sidelnikovand Shestakov showed that this choice is insecure. Wieschebrink proposed avariant of the McEliece cryptosystem which consists in concatenating a fewrandom columns to a generator matrix of a secretly chosen generalizedReed-Solomon code. More recently, new schemes appeared which are thehomomorphic encryption scheme proposed by Bogdanov and Lee, and a variation ofthe McEliece cryptosystem proposed by Baldi et \textit{al.} which hides thegeneralized Reed-Solomon code by means of matrices of very low rank. In this work, we show how to mount key-recovery attacks against thesepublic-key encryption schemes. We use the concept of distinguisher which aimsat detecting a behavior different from the one that one would expect from arandom code. All the distinguishers we have built are based on the notion ofcomponent-wise product of codes. It results in a powerful tool that is able torecover the secret structure of codes when they are derived from generalizedReed-Solomon codes. Lastly, we give an alternative to Sidelnikov and Shestakovattack by building a filtration which enables to completely recover the supportand the non-zero scalars defining the secret generalized Reed-Solomon code.
机译:由于它们有趣的代数性质,一些作者提倡在密码术中使用广义Reed-Solomon码。 Niederreiter是第一个建议使用他们实例化他的密码系统的人,但是Sidelnikovand Shestakov表明这种选择是不安全的。 Wieschebrink提出了McEliece密码系统的一个变体,该系统的特点是将几个随机列连接到秘密选择的广义Reed-Solomon码的生成器矩阵上。最近,出现了新的方案,这是Bogdanov和Lee提出的同态加密方案,以及Baldi et \ textit {al。}提出的McEliece密码体制的一种变体,该体制通过非常低等级的矩阵隐藏了通用的Reed-Solomon码。在这项工作中,我们将展示如何针对这些公钥加密方案发起密钥恢复攻击。我们使用“区分器”的概念,其目的是检测一种行为,该行为不同于人们从随机代码中期望的行为。我们构建的所有区分符都是基于组件的代码乘积概念。它产生了一个强大的工具,当它从广义Reed-Solomon代码派生时,能够恢复代码的秘密结构。最后,我们通过构建一个过滤器来替代Sidelnikov和Shestakovattack,该过滤器可以完全恢复定义秘密广义Reed-Solomon码的支持和非零标量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号