Publication:

Considerations for rank-based cryptosystems

Date

Date

Date
2016
Conference or Workshop Item
Published version
cris.lastimport.scopus2025-08-15T07:54:59Z
cris.lastimport.wos2025-08-16T01:32:10Z
dc.contributor.institutionUniversity of Zurich
dc.date.accessioned2018-01-19T13:36:19Z
dc.date.available2018-01-19T13:36:19Z
dc.date.issued2016-07-15
dc.description.abstract

Cryptosystems based on rank metric codes have been considered as an alternative to McEliece cryptosystems due to the relative difficulty of solving the rank syndrome decoding problem. Generic attacks have recently seen several improvements, notably in the work of Gaborit et al., who give an improved algorithm using linearized polynomials which yields a polynomial time algorithm for certain parameters. On the structural side, many of the proposals for cryptosystems based on Gabidulin codes have proven to be weak, following an attack by Overbeck in 2001. Of the Gabidulin based systems managing to resist Overbeck's attack, several were recently broken by Horlemann-Trautmann et al. using an attack based on finding the elements of rank one in some extended code. In this paper, we extend the polynomial time algorithm of Gaborit using the same underlying idea as Horlemann-Trautmann et al., and then demonstrate how codes with implicit structural weakness may be exploited, even if the explicit structure is not determined. We use this attack to break a Gabidulin code based cryptosystem which has so far resisted structural attacks.

dc.identifier.doi10.1109/ISIT.2016.7541758
dc.identifier.isbn978-1-5090-1806-2
dc.identifier.scopus2-s2.0-84985920167
dc.identifier.urihttps://www.zora.uzh.ch/handle/20.500.14742/130620
dc.identifier.wos000390098702122
dc.language.isoeng
dc.subject.ddc510 Mathematics
dc.title

Considerations for rank-based cryptosystems

dc.typeconference_item
dcterms.accessRightsinfo:eu-repo/semantics/closedAccess
dcterms.bibliographicCitation.booktitle2016 IEEE International Symposium on Information Theory (ISIT)
dcterms.bibliographicCitation.originalpublishernameIEEE
dcterms.bibliographicCitation.pageend2548
dcterms.bibliographicCitation.pagestart2544
dspace.entity.typePublicationen
oairecerif.event.endDate2016-07-15
oairecerif.event.placeBarcelona
oairecerif.event.startDate2016-07-10
uzh.contributor.affiliationSwiss Federal Institute of Technology EPFL, Lausanne
uzh.contributor.affiliationUniversity of Zurich
uzh.contributor.affiliationUniversity of Zurich
uzh.contributor.authorHorlemann-Trautmann, Anna-Lena
uzh.contributor.authorMarshall, Kyle
uzh.contributor.authorRosenthal, Joachim
uzh.contributor.correspondenceYes
uzh.contributor.correspondenceNo
uzh.contributor.correspondenceNo
uzh.date.akaber2017
uzh.document.availabilitynone
uzh.eprint.datestamp2018-01-19 13:36:19
uzh.eprint.lastmod2022-01-26 12:58:44
uzh.eprint.statusChange2018-01-19 13:36:19
uzh.event.presentationTypepaper
uzh.event.titleIEEE International Symposium on Information Theory (ISIT)
uzh.event.typeconference
uzh.harvester.ethYes
uzh.harvester.nbNo
uzh.identifier.doi10.5167/uzh-137399
uzh.oastatus.unpaywallclosed
uzh.oastatus.zoraClosed
uzh.publication.citationHorlemann-Trautmann, Anna-Lena; Marshall, Kyle; Rosenthal, Joachim (2016). Considerations for rank-based cryptosystems. In: IEEE International Symposium on Information Theory (ISIT), Barcelona, 10 July 2016 - 15 July 2016. IEEE, 2544-2548.
uzh.publication.freeAccessAtUNSPECIFIED
uzh.publication.originalworkoriginal
uzh.publication.publishedStatusfinal
uzh.scopus.impact14
uzh.scopus.subjectsTheoretical Computer Science
uzh.scopus.subjectsInformation Systems
uzh.scopus.subjectsModeling and Simulation
uzh.scopus.subjectsApplied Mathematics
uzh.workflow.doajuzh.workflow.doaj.false
uzh.workflow.eprintid137399
uzh.workflow.fulltextStatusrestricted
uzh.workflow.revisions28
uzh.workflow.rightsCheckkeininfo
uzh.workflow.sourceCrossRef:10.1109/ISIT.2016.7541758
uzh.workflow.statusarchive
uzh.wos.impact11
Files

Original bundle

Name:
rosenthal_considerations_congress.pdf
Size:
249.59 KB
Format:
Adobe Portable Document Format
Downloadable by admins only
Publication available in collections: