Vestnik Yuzhno-Ural'skogo Universiteta. Seriya Matematicheskoe Modelirovanie i Programmirovanie
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Submit a manuscript

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestnik YuUrGU. Ser. Mat. Model. Progr.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik Yuzhno-Ural'skogo Universiteta. Seriya Matematicheskoe Modelirovanie i Programmirovanie, 2021, Volume 14, Issue 3, Pages 18–32
DOI: https://doi.org/~10.14529/mmp210302
(Mi vyuru604)
 

Mathematical Modeling

Cryptanalysis of the BBCRS system on Reed–Muller binary code

Yu. V. Kosolapov, A. A. Lelyuk

Southern Federal University, Rostov-on-Don, Russian Federation
References:
Abstract: The paper considers the BBCRS system which is a modification of the McEliece cryptosystem proposed by M. Baldi and some others. In this modification matrix $G_{pub}$ of the public key is the product of three matrices: a non-singular $(k\times k)$-matrix $S$, a generator matrix $G$ of a secret $[n,k]_q$-code $C_{sec}$, and a non-singular $(n\times n)$-matrix $Q$. The difference between the modified system and the original system is that the permutation matrix used in the McEliece system is replaced by a non-singular matrix $Q$. The matrix $Q$ is obtained as the sum of a permutation matrix $P$ and a matrix $R$ of small rank $r(R)$. Later, V. Gauthier and some others constructed an attack that allows decrypting messages in the case when $C_{sec}$ is a generalized Reed–Solomon code (GRS code) and $r(R)=1$. The key stages of the constructed attack are, firstly, finding the intersection of the linear span $\mathcal{L}(G_{pub})=C_{pub}$ and $\mathcal{L}(G P)=C$ that spanned on the rows of the matrices $G_{pub}$ and $G P$ respectively, and secondly, finding the code $C$ by the subcode $C_{pub}\cap C$. In this paper we present an attack in the case when $C_{sec}$ is the Reed–Muller binary code of order $r$, length $2^m$ and $r(R)=1$. The stages of finding the codes $C_{pub}\cap C$ and $C$ in this paper are completely different from the corresponding steps in attack by V. Gauthier and some others and other steps are the adaptation of the known results of cryptanalysis that applied in the case of GRS codes.
Keywords: BBCRS cryptosystem, Reed–Muller codes, cryptanalysis.
Received: 14.03.2021
Document Type: Article
UDC: 519.1
MSC: 94A60, 68P25
Language: Russian
Citation: Yu. V. Kosolapov, A. A. Lelyuk, “Cryptanalysis of the BBCRS system on Reed–Muller binary code”, Vestnik YuUrGU. Ser. Mat. Model. Progr., 14:3 (2021), 18–32
Citation in format AMSBIB
\Bibitem{KosLel21}
\by Yu.~V.~Kosolapov, A.~A.~Lelyuk
\paper Cryptanalysis of the BBCRS system on Reed--Muller binary code
\jour Vestnik YuUrGU. Ser. Mat. Model. Progr.
\yr 2021
\vol 14
\issue 3
\pages 18--32
\mathnet{http://mi.mathnet.ru/vyuru604}
Linking options:
  • https://www.mathnet.ru/eng/vyuru604
  • https://www.mathnet.ru/eng/vyuru/v14/i3/p18
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Statistics & downloads:
    Abstract page:155
    Full-text PDF :38
    References:16
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024