twisted hermitian codes and the mceliece cryptosystem
play

Twisted Hermitian Codes and the McEliece Cryptosystem Bethany - PowerPoint PPT Presentation

Twisted Hermitian Codes and the McEliece Cryptosystem Bethany Matsick Liberty University January 26, 2018 Joint work with Austin Allen, Keller Blackwell, Olivia Fiol, Rutuja Kshirsagar, and Zoe Nelson, supervised by Gretchen Matthews. Coding


  1. Twisted Hermitian Codes and the McEliece Cryptosystem Bethany Matsick Liberty University January 26, 2018 Joint work with Austin Allen, Keller Blackwell, Olivia Fiol, Rutuja Kshirsagar, and Zoe Nelson, supervised by Gretchen Matthews.

  2. Coding Theory What is coding theory? Coding theory studies the properties of codes and their various applications. Its goal is to provide reliable communication or reliable storage of data. What are codes used for? ◮ Data transmission ◮ Data storage ◮ Error/correction ◮ Cryptography

  3. The Hermitian code Definition Fix a prime power q, and let F q be the finite field with q elements. A Hermitian code by the set C ( α P ∞ ) := { ( f ( P 1 ) , . . . , f ( P n )) : f ∈ L ( α P ∞ ) } ⊆ ( F q ) n , where L ( α P ∞ ) = � 1 , x , y , x 2 , xy , y 2 , x 3 , x 2 y , . . . , x m y n � , and m and n are the largest integers such that mq + n ( q + 1) ≤ α .

  4. Example A Hermitian code Let q = 5 and α = 12. For every x i y j , we require that i and j satisfy the equation 5 i + 6 j ≤ 12. Thus, L (12 P ∞ ) = � 1 , x , y , x 2 , xy , y 2 � .

  5. Introduction to McEliece The McEliece cryptosystem ◮ Public key cryptosystem ◮ Security based on code indistinguishability ◮ Candidate for use in the post-quantum era

  6. The McEliece cryptosystem Method of Encryption and Decryption Let ◮ S ∈ F k × k be an invertible matrix. q ◮ P ∈ F n × n be a permutation matrix. q ◮ G ∈ F k × n be a generator matrix for a t -error correcting q code. Set G pub = SGP ∈ F k × n . q ◮ Release ( G pub , t ) as the public key. ◮ Keep ( S , D C , P ) as the private key where D C is an efficient decoding algorithm.

  7. Encryption and Decryption To send a private message m = ( m 1 , m 2 , ..., m k ) ∈ F k q , ◮ Multiply on the right by G pub and add an error vector e of weight ≤ t to obtain w = mG pub + e = mSGP + e . When w is received by the user holding the private key, ◮ Multiply by P − 1 on the right to obtain wP − 1 = mSG + eP − 1 . ◮ Apply D C to wP − 1 to get mS . ◮ Multiply by S − 1 on the right to obtain m .

  8. Schur square Definition The Schur square of C ⊆ F n is C 2 = � a ∗ b : a , b ∈ C� . If C k ⊆ F n has basis { b 1 , b 2 , ..., b k } , then C 2 k = � b i ∗ b j : 1 ≤ i , j ≤ k � .

  9. Schur square dimension How large can the Schur square be for a given code C of dimension k ? = k ( k +1) � k +1 ◮ The largest possible dimension of is � . 2 2 ◮ Since C 2 ⊆ F n , its dimension cannot exceed n . ◮ Consequently, dim C 2 ≤ min { n , � k +1 � } . 2

  10. Schur squares and McEliece Lemma If C ⊆ F n is a code chosen at random from the set of all � k +1 � k-dimensional codes with < n, then 2 � � k + 1 �� dim C 2 Pr k = = 1 . 2 Goal: Choose families of codes such that G pub behaves as the generator matrix of a random code. Given the above lemma, we seek codes with dim C 2 = � k +1 � . 2

  11. Example Schur square of a Hermitian code Let q = 5 and α = 12. Then L (12 P ∞ ) = � 1 , x , y , x 2 , xy , y 2 � . ◮ Counting the basis elements, observe k = 6. � k +1 ◮ Thus, we have � = 21. 2 Computing the Schur square, we find L (12 P ∞ ) 2 = � 1 , x , y , x 2 , xy , y 2 , . . . , x 2 y 2 , xy 3 , y 4 � . ◮ Counting the basis elements, we find 15 < 21 basis elements. ◮ While not extremely low, this dimension is clearly less than the desired Schur square dimension.

  12. Example Three twists Let q = 5 and α = 12. Recall L (12 P ∞ ) = � 1 , x , y , x 2 , xy , y 2 � . ◮ To implement three “twists,” let h = ((2 , 0) , (1 , 1) , (0 , 2)) and t = ((4 , − 1) , (7 , 0) , (10 , 1)). ◮ “Hooking” and “twisting” elements appropriately, L k , t , h , η (12 P ∞ ) = � 1 , x , y , x 2 + x 4 y , xy + x 7 y 2 , y 2 + x 10 y 3 � .

  13. Example Three twists (continued) ◮ From the previous slide, recall L k , t , h , η (12 P ∞ ) = � 1 , x , y , x 2 + x 4 y , xy + x 7 y 2 , y 2 + x 10 y 3 � . ◮ Counting the basis elements, we find k = 6. ◮ Thus, we desire a Schur square dimension of � 6+1 = 6 · 7 � = 21. 2 2 ◮ We indeed find that dim L t , h , η (12 P ∞ ) 2 = 21 .

  14. Why did the twists raise the dimension so effectively? Main ideas ◮ Hook elements with powers equal to the sums of other powers. ◮ Space out twists so that multiplied elements land in “gaps.” ◮ Maintain linear independence of basis elements.

  15. ℓ -Twisted Hermitian codes Definition We define an ℓ -twist Hermitian code to be C k , t , h ,η ( α P ∞ ) = ev ( � f : f ∈ L k , t , h , η ( α P ∞ ) � ) , where L k , t , h , η ( α P ∞ ) := �{ x i y j : 0 ≤ i , 0 ≤ j ≤ q − 1 , iq + j ( q + 1) ≤ α, ℓ � � � x a k y b k + η k x u + r k y v + s k ( i , j ) � = ( a k , b k ) , ∀ k = 1 , . . . , ℓ } ∪ � . k =1

  16. General Twisted Hermitian codes Then, if dim C k , t , h , η ( α P ∞ ) = k , we find that � k + 1 � dim C k , t , h , η ( α P ∞ ) 2 ≥ − g . 2

  17. References P. Beelen, M. Bossert, S. Puchinger, J. Rosenkilde. Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography, IEEE International Symposium on Information Theory, 2018. P. Beelen, J.S.R. Nielsen. Sub-quadratic Decoding of One-Point Hermitian Codes, IEEE Transactions on Information Theory, 2015. P. Beelen, S. Puchinger, J. Rosenkilde. Twisted Reed-Solomon Codes, IEEE International Symposium on Information Theory, 2017. J. Walker. Codes and Curves, 2000.

  18. Acknowledgements Work completed collectively with Austin Allen, Keller Blackwell, Olivia Fiol, Rutuja Kshirsagar, and Zoe Nelson, supervised by Gretchen Matthews. The twisted construction is a variant of that considered by Peter Beelen, Martin Bossert, Sven Puchinger, and Johan Rosenkilde. Special thanks to Liberty University for providing assistance with the cost of travel.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend