On the security of two IKKR-type code-based cryptosystems.

Uloženo v:
Podrobná bibliografie
Název: On the security of two IKKR-type code-based cryptosystems.
Autoři: Vedenev, Kirill
Zdroj: Designs, Codes & Cryptography; Nov2025, Vol. 93 Issue 11, p4779-4798, 20p
Témata: REED-Solomon codes, CRYPTOSYSTEMS, COMPUTER security vulnerabilities, SECURITY management
Abstrakt: The paper analyzes the security of two recently proposed code-based cryptosystems that employ encryption of the form y = m G pub + e E pub : the Krouk–Kabatiansky–Tavernier (KKT) cryptosystem and the Lau-Ivanov-Ariffin-Chin-Yap (LIACY) cryptosystem. We demonstrate that the KKT cryptosystem can be efficiently reduced to a variant of the McEliece scheme, where a small set of columns in the public generator matrix is replaced with random ones. This reduction implies that the KKT cryptosystem is vulnerable to existing attacks on Wieschebrink's encryption scheme, particularly when Generalized Reed-Solomon (GRS) codes are used. In addition, we present a full polynomial-time key-recovery attack on the LIACY cryptosystem by exploiting its linear-algebraic structure and leveraging distinguishers of subcodes of GRS codes. Our findings reveal critical vulnerabilities in both systems, effectively compromising their security despite their novel designs. [ABSTRACT FROM AUTHOR]
Copyright of Designs, Codes & Cryptography is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Databáze: Complementary Index
Popis
Abstrakt:The paper analyzes the security of two recently proposed code-based cryptosystems that employ encryption of the form y = m G pub + e E pub : the Krouk–Kabatiansky–Tavernier (KKT) cryptosystem and the Lau-Ivanov-Ariffin-Chin-Yap (LIACY) cryptosystem. We demonstrate that the KKT cryptosystem can be efficiently reduced to a variant of the McEliece scheme, where a small set of columns in the public generator matrix is replaced with random ones. This reduction implies that the KKT cryptosystem is vulnerable to existing attacks on Wieschebrink's encryption scheme, particularly when Generalized Reed-Solomon (GRS) codes are used. In addition, we present a full polynomial-time key-recovery attack on the LIACY cryptosystem by exploiting its linear-algebraic structure and leveraging distinguishers of subcodes of GRS codes. Our findings reveal critical vulnerabilities in both systems, effectively compromising their security despite their novel designs. [ABSTRACT FROM AUTHOR]
ISSN:09251022
DOI:10.1007/s10623-025-01683-z