Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems (Q6112240)

From MaRDI portal
scientific article; zbMATH DE number 7709009
Language Label Description Also known as
English
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
scientific article; zbMATH DE number 7709009

    Statements

    Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems (English)
    0 references
    0 references
    0 references
    7 July 2023
    0 references
    The paper presents two cryptanalytic attacks, with polynomial time complexity, to the IKKR public-key cryptosystem, a code-based scheme due to \textit{F. Ivanov} et al. [Lect. Notes Comput. Sci. 12087, 41--49 (2020; Zbl 1459.94117)]. The first proposed code-based cryptosystem was the celebrated scheme of \textit{R. J. McEliece} [DSN Progress Report. Technical report. Pasadena: Jet Propulsion Laboratory (1978)]. In it a message \(m\) of length \(k\)\, is ciphered as \(c=mG_{\mathrm{pub}}+e\) where \(G_{\mathrm{pub}}\)\, is a \(k\times n\)\, matrix, in fact a generating matrix of a Goppa code, disguised to look as the generating matrix of a general lineal code, and \(e\)\, a error vector with Hamming weigh less or equal that the correcting capability of the Goppa code. The IKKR cryptosystem (in fact two versions: the modified and the ungraded one) takes a different approach, introducing a new matrix \(E_{\mathrm{pub}}\)\, and allowing \(e\)\, to be of arbitrary weigh. The ciphering is now \(c=mG_{\mathrm{pub}}+eE_{\mathrm{pub}}\). An attack to the IKKR-PKE, the LCKN attack, was proposed by \textit{Y. Lee} et al. [IEEE Commun. Lett. 24, No. 12, 2678--2681 (2020; \url{doi:10.1109/LCOMM.2020.3019054})]. The first attack of the present paper is similar to it ``whilst our second attack is more efficient than the LCKN attack''. Section 2 provides the necessary details about error-correcting codes defined over a finite field \(\mathbb{F}_q\)\, and Section 3 summarizes the modified and the ungraded IKKR crytosystem. Section 4 reveals a weakness in the design of the IKKR scheme which is crucial in the two proposed plaintext recovery attacks.(Algorithms 2 and 3). The first algorithm has complexity \(n^4 + 2n^3+n^2\)\, operations in the underlying field \(\mathbb{F}_q\)\, while Algorithm 3 has complexity \(2n^3+k^4+k^3+k^2\)\, operations. Section 5 shows results of an implementation using Magma V2.20-5, see Table 3. These results show that ``we can recover the plaintext from a given ciphertext in less than 176 miliseconds''. Finally Section 6 proves the impossibility of repairing both versions of the IKKR scheme.
    0 references
    code-based cryptography
    0 references
    McEliece cryptosystem
    0 references
    post-quantum cryptography
    0 references
    cryptanalysis
    0 references
    plaintext recovery attack
    0 references
    public-key encryption
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references