Publication: Considerations for rank-based cryptosystems
Considerations for rank-based cryptosystems
Date
Date
Date
| cris.lastimport.scopus | 2025-08-15T07:54:59Z | |
| cris.lastimport.wos | 2025-08-16T01:32:10Z | |
| dc.contributor.institution | University of Zurich | |
| dc.date.accessioned | 2018-01-19T13:36:19Z | |
| dc.date.available | 2018-01-19T13:36:19Z | |
| dc.date.issued | 2016-07-15 | |
| dc.description.abstract | Cryptosystems based on rank metric codes have been considered as an alternative to McEliece cryptosystems due to the relative difficulty of solving the rank syndrome decoding problem. Generic attacks have recently seen several improvements, notably in the work of Gaborit et al., who give an improved algorithm using linearized polynomials which yields a polynomial time algorithm for certain parameters. On the structural side, many of the proposals for cryptosystems based on Gabidulin codes have proven to be weak, following an attack by Overbeck in 2001. Of the Gabidulin based systems managing to resist Overbeck's attack, several were recently broken by Horlemann-Trautmann et al. using an attack based on finding the elements of rank one in some extended code. In this paper, we extend the polynomial time algorithm of Gaborit using the same underlying idea as Horlemann-Trautmann et al., and then demonstrate how codes with implicit structural weakness may be exploited, even if the explicit structure is not determined. We use this attack to break a Gabidulin code based cryptosystem which has so far resisted structural attacks. | |
| dc.identifier.doi | 10.1109/ISIT.2016.7541758 | |
| dc.identifier.isbn | 978-1-5090-1806-2 | |
| dc.identifier.scopus | 2-s2.0-84985920167 | |
| dc.identifier.uri | https://www.zora.uzh.ch/handle/20.500.14742/130620 | |
| dc.identifier.wos | 000390098702122 | |
| dc.language.iso | eng | |
| dc.subject.ddc | 510 Mathematics | |
| dc.title | Considerations for rank-based cryptosystems | |
| dc.type | conference_item | |
| dcterms.accessRights | info:eu-repo/semantics/closedAccess | |
| dcterms.bibliographicCitation.booktitle | 2016 IEEE International Symposium on Information Theory (ISIT) | |
| dcterms.bibliographicCitation.originalpublishername | IEEE | |
| dcterms.bibliographicCitation.pageend | 2548 | |
| dcterms.bibliographicCitation.pagestart | 2544 | |
| dspace.entity.type | Publication | en |
| oairecerif.event.endDate | 2016-07-15 | |
| oairecerif.event.place | Barcelona | |
| oairecerif.event.startDate | 2016-07-10 | |
| uzh.contributor.affiliation | Swiss Federal Institute of Technology EPFL, Lausanne | |
| uzh.contributor.affiliation | University of Zurich | |
| uzh.contributor.affiliation | University of Zurich | |
| uzh.contributor.author | Horlemann-Trautmann, Anna-Lena | |
| uzh.contributor.author | Marshall, Kyle | |
| uzh.contributor.author | Rosenthal, Joachim | |
| uzh.contributor.correspondence | Yes | |
| uzh.contributor.correspondence | No | |
| uzh.contributor.correspondence | No | |
| uzh.date.akaber | 2017 | |
| uzh.document.availability | none | |
| uzh.eprint.datestamp | 2018-01-19 13:36:19 | |
| uzh.eprint.lastmod | 2022-01-26 12:58:44 | |
| uzh.eprint.statusChange | 2018-01-19 13:36:19 | |
| uzh.event.presentationType | paper | |
| uzh.event.title | IEEE International Symposium on Information Theory (ISIT) | |
| uzh.event.type | conference | |
| uzh.harvester.eth | Yes | |
| uzh.harvester.nb | No | |
| uzh.identifier.doi | 10.5167/uzh-137399 | |
| uzh.oastatus.unpaywall | closed | |
| uzh.oastatus.zora | Closed | |
| uzh.publication.citation | Horlemann-Trautmann, Anna-Lena; Marshall, Kyle; Rosenthal, Joachim (2016). Considerations for rank-based cryptosystems. In: IEEE International Symposium on Information Theory (ISIT), Barcelona, 10 July 2016 - 15 July 2016. IEEE, 2544-2548. | |
| uzh.publication.freeAccessAt | UNSPECIFIED | |
| uzh.publication.originalwork | original | |
| uzh.publication.publishedStatus | final | |
| uzh.scopus.impact | 14 | |
| uzh.scopus.subjects | Theoretical Computer Science | |
| uzh.scopus.subjects | Information Systems | |
| uzh.scopus.subjects | Modeling and Simulation | |
| uzh.scopus.subjects | Applied Mathematics | |
| uzh.workflow.doaj | uzh.workflow.doaj.false | |
| uzh.workflow.eprintid | 137399 | |
| uzh.workflow.fulltextStatus | restricted | |
| uzh.workflow.revisions | 28 | |
| uzh.workflow.rightsCheck | keininfo | |
| uzh.workflow.source | CrossRef:10.1109/ISIT.2016.7541758 | |
| uzh.workflow.status | archive | |
| uzh.wos.impact | 11 | |
| Files | Original bundle
rosenthal_considerations_congress.pdfview file |Download249.59 KB | |
| Publication available in collections: |