The non-gap sequence of a subcode of a generalized Reed-Solomon code (Q1934242): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-012-9694-2 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2126075688 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to mask the structure of codes for a cryptographic use / rank
 
Normal rank
Property / cites work
 
Property / cites work: Grover vs. McEliece / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distance bounds for algebraic geometric codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the order bounds for one-point AG codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4242017 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New generalizations of the Reed-Muller codes--I: Primitive codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3752293 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Code-based cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the edge-independence number and edge-covering number for regular graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A lower bound for the number of solutions of equations over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic function fields and codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes / rank
 
Normal rank

Latest revision as of 03:03, 6 July 2024

scientific article
Language Label Description Also known as
English
The non-gap sequence of a subcode of a generalized Reed-Solomon code
scientific article

    Statements

    The non-gap sequence of a subcode of a generalized Reed-Solomon code (English)
    0 references
    0 references
    0 references
    28 January 2013
    0 references
    The Berger-Loidreau cryptosystem [\textit{T. P. Berger} and \textit{P. Loidreau}, ibid. 35, No. 1, 63--79 (2005; Zbl 1136.11327)] is a version of an older scheme based on a class of error-correcting codes, namely the generalized Reed-Solomon (GRS) codes. It was made in order to resist against the Sidel'nikov-Shestakov attack [\textit{V. M. Sidel'nikov} and \textit{S. O. Shestakov}, Discrete Math. Appl. 2, No. 4, 439--444 (1992); translation from Diskretn. Mat. 4, No. 3, 57--63 (1992; Zbl 0796.94006)]. But, using the remark that if the square code of an \((n,k)\)-GRS code is itself a code of length \(2k-1\) then the secret key generated is cryptographically weak (and the Sidel'nikov-Shestakov scheme can construct it in polynomial time). The goal of the paper is to estimate what is the proportion of weak keys in this cryptosystem (meaning the probability that an arbitrary subcode of a GRS code is itself a GRS code). The mathematical instrument used is the notion of non-gaps sequences associated to subcodes (the number of non-gaps sequences is closely related with the number of subcodes of a GRS code which are itself GRS codes). The authors analyse the two possible cases when subcodes of a GRS code are weak keys: (1) when they are themselves GRS codes (Section 4 of the paper concludes that the probability of their occurrence is very small), and (2) they are subcodes whose square code is a GRS code of maximal dimension (Sections 5 and 6 give an estimation of their number, by concluding that the number of weak keys is proportionally high). Even if the restrictions imposed for the last case are somehow strange, the authors claim that they ``are sure that a sharper and more general result can be achieved''.
    0 references
    Berger-Loidreau cryptosystem
    0 references
    square codes
    0 references
    GRS codes
    0 references
    gaps of a code
    0 references

    Identifiers