On the security of two IKKR-type code-based cryptosystems.
Saved in:
| Title: | On the security of two IKKR-type code-based cryptosystems. |
|---|---|
| Authors: | Vedenev, Kirill |
| Source: | Designs, Codes & Cryptography; Nov2025, Vol. 93 Issue 11, p4779-4798, 20p |
| Subject Terms: | REED-Solomon codes, CRYPTOSYSTEMS, COMPUTER security vulnerabilities, SECURITY management |
| Abstract: | The paper analyzes the security of two recently proposed code-based cryptosystems that employ encryption of the form y = m G pub + e E pub : the Krouk–Kabatiansky–Tavernier (KKT) cryptosystem and the Lau-Ivanov-Ariffin-Chin-Yap (LIACY) cryptosystem. We demonstrate that the KKT cryptosystem can be efficiently reduced to a variant of the McEliece scheme, where a small set of columns in the public generator matrix is replaced with random ones. This reduction implies that the KKT cryptosystem is vulnerable to existing attacks on Wieschebrink's encryption scheme, particularly when Generalized Reed-Solomon (GRS) codes are used. In addition, we present a full polynomial-time key-recovery attack on the LIACY cryptosystem by exploiting its linear-algebraic structure and leveraging distinguishers of subcodes of GRS codes. Our findings reveal critical vulnerabilities in both systems, effectively compromising their security despite their novel designs. [ABSTRACT FROM AUTHOR] |
| Copyright of Designs, Codes & Cryptography is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Full Text Finder
Nájsť tento článok vo Web of Science