Cryptanalysis of a variant of the McEliece encryption scheme
Julien Lavauzelle
IRMAR, Université de Rennes 1
Journées Nationales de Calcul Formel 2020 03/03/2020
Cryptanalysis of a variant of the McEliece encryption scheme Julien - - PowerPoint PPT Presentation
Cryptanalysis of a variant of the McEliece encryption scheme Julien Lavauzelle IRMAR, Universit de Rennes 1 Journes Nationales de Calcul Formel 2020 03/03/2020 Outline 1. McEliece cryptosystem and variants 2. Attack on the ReedSolomon
Journées Nationales de Calcul Formel 2020 03/03/2020
0/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
1/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
1/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
1/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
2/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
1, . . . , x′ n ∈
1, . . . , y′ n ∈ F× q such that
1g1(x′ 1)
ng1(x′ n)
1gk(x′ 1)
ngk(x′ n)
2/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q pairwise distinct,
i=1(x − xi) ∈ Fq[x],
π(x1), . . . , Γ(x1) π(x1)
q )n.
3/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q pairwise distinct,
i=1(x − xi) ∈ Fq[x],
π(x1), . . . , Γ(x1) π(x1)
q )n.
3/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q pairwise distinct
q )n
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q pairwise distinct
q )n
4/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q pairwise distinct
q )n
4/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q pairwise distinct
q )n
4/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
4/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
q are pairwise distinct, and (y1, . . . , yn) ∈ (F× q )n.
1, . . . , x′ n) ∈ Fn q and non-zero elements (y′ 1, . . . , y′ n) ∈ (F× q )n such that
1g1(x′ 1)
ng1(x′ n)
1gk(x′ 1)
ngk(x′ n)
5/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
6/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
q
7/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
q
7/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
8/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
8/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
8/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
ct+d is 3-transitive over Fq ∪ {∞}.
8/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
k−1
i=1
9/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
k−1
i=1
9/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
10/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
uk+1 vk+1
un vn
g(x) = αx+β γx+δ
10/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
uk+1 vk+1
un vn
g(x) = αx+β γx+δ
vi , where i ∈ {n − 2, n − 1, n}
10/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
uk+1 vk+1
un vn
g(x) = αx+β γx+δ
vi , where i ∈ {n − 2, n − 1, n}
vi
10/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
11/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
cx+d1 and y′ = λy.
11/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
11/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
k − 1 n − 1 12/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
k − 1 n − 1
12/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
k − 1 n − 1
k − 1 h k − 1 + t n − 1 12/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
k − 1 n − 1
k − 1 h k − 1 + t n − 1
q pairwise distinct, and y = 1.
q2
12/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
1
2
n−1
n
1+ηxk−1+t 1
2+ηxk−1+t 2
n−1+ηxk−1+t n−1
n+ηxk−1+t n
1
2
n−1
n
13/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
14/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
14/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
14/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
14/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
15/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q2:
q = {c ∈ C | ∀i ∈ [1, n], ci ∈ Fq}
16/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q2:
q = {c ∈ C | ∀i ∈ [1, n], ci ∈ Fq}
16/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q2:
q = {c ∈ C | ∀i ∈ [1, n], ci ∈ Fq}
k − 1 h k − 1 + t n − 1
k − 1 h n − 1
16/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
17/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q
k − 1 h n − 1
k − 1 2k − 2 n − 1
q)⋆2 = GRS2k−1(x, 1)
17/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q)⋆2 = GRS2k−1(x, 1)
18/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q)⋆2 = GRS2k−1(x, 1)
18/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q2
q2.
q .
sub of the square code
q)⋆2 .
sub and recover x′ = ax + b1.
19/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
q2
q2.
q .
sub of the square code
q)⋆2 .
sub and recover x′ = ax + b1.
19/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –
20/20
JNCF 2020 – Cryptanalysis of a variant of the McEliece encryption scheme –