Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e...

48
/k Code Based Cryptology at TU/e Ruud Pellikaan [email protected] University Indonesia, Depok, Nov. 2 University Padjadjaran, Bandung, Nov. 6 Institute Technology Bandung, Bandung, Nov. 6 University Gadjah Mada, Yogyakarta, Nov. 9 University Sebelas Maret, Surakarta, Nov. 11 November 2015

Transcript of Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e...

Page 1: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

/k

Code Based Cryptology at TU/e

Ruud [email protected]

University Indonesia, Depok, Nov. 2University Padjadjaran, Bandung, Nov. 6

Institute Technology Bandung, Bandung, Nov. 6University Gadjah Mada, Yogyakarta, Nov. 9

University Sebelas Maret, Surakarta, Nov. 11

November 2015

Page 2: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

2/48

/k

Content

1. Ambassador of TU/e

2. Introduction on Coding, Crypto and Security

3. Public-key crypto systems

4. One-way functions and

5. Code based public-key crypto system

6. Error-correcting codes

7. Error-correcting pairs

Page 3: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

3/48

/k

Coding

I correct transmission of dataI error-correctionI no secrecy involvedI communication: internet, telephone, ...I fault tolerant computingI memory: computer compact disc, DVD, USB stick ...

Page 4: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

4/48

/k

Crypto

I private transmission of dataI secrecy involvedI privacyI eaves droppingI insert false messagesI authenticationI electronic signatureI identity fraud

Page 5: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

5/48

/k

Security

I secure transmission of dataI secrecy involvedI electronic votingI electronic commerceI money transferI databases of patients

Page 6: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

6/48

/k

Public-key cryptography (PKC)

I Diffie and Hellman 1976 in the public domain inI Ellis in 1970 for secret service, not made public until 1997I advantage with respect to symmetric-key cryptographyI no exchange of secret key between sender and receiver

Page 7: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

7/48

/k

One-way function

I At the heart of any public-key cryptosystem is aI one-way functionI a function y = f (x) that isI easy to evaluate butI for which it is computationally infeasible (one hopes)I to find the inverse x = f−1(y)

Page 8: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

8/48

/k

Examples of one-way function

I Example 1I differentiation a function is easyI integrating a function is difficult

I Example 2I checking whether a given proof is correct is easyI finding the proof of a proposition is difficult

Page 9: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

9/48

/k

Integer factorization

I x = (p, q) is a pair of distinct prime numbersI y = pq is its productI proposed by Cocks in 1973 in secret serviceI Rivest-Shamir-Adleman (RSA) in 1978 in public domainI based on the hardness of factorizing integers

Page 10: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

10/48

/k

Discrete logarithm

I G is a group (written multiplicatively)I with a ∈ G and x an integerI y = ax

I Diffie-Hellman in 1974 and 1976 in public domainI proposed by Williamson in 1974 in secret serviceI based on difficulty of finding discrete logarithms in a finite field

Page 11: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

11/48

/k

Elliptic curve discrete logarithm

I G is an elliptic curve group (written additively) over a finite fieldI P is a point on the curveI x = k a positive integer kI y = kP is another point on the curveI obtained by the multiplication of P with a positive integer kI proposed by Koblitz and Miller in 1985I based on the difficulty of inverting this function in G

Page 12: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

12/48

/k

Code based cryptography

I H is a given r × n matrix with entries in Fq

I x is in Fnq of weight at most t

I y = xH T

I proposed by McEliece in 1978 and later by NiederreiterI based on the difficulty of decoding error-correcting codesI it is NP complete

Page 13: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

13/48

/k

NP complete problems

I NP = nondeterministic polynomial timeI given a problem with yes/no answerI if answer is yes and the solution is givenI then one can check it in polynomial time

I Input: integer nI Query: can one factorize n in n = pq with p and q > 1?I if answer is yes and someone gives p and qI then one easily checks that n = pqI otherwise it is difficult to find p and q

Page 14: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

14/48

/k

Abstract

I error-correcting codesI error-correcting pairs correct errors efficientlyI applies to many known codesI prime example Generalized Reed-Solomon codesI can be explained in a short timeI is a distinguisher of certain classes of codesI McEliece public-key cryptosystemI polynomial attack if algebraic geometry codes are usedI ECP map is a one-way function

Page 15: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

15/48

/k

Information theory: Shannon

sourceencoding

sender

noise

receiverdecoding

target-message

-001... -011... -message

6

Block diagram of a communication system

Page 16: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

16/48

/k

Error-correcting codes: Hamming

Q alphabet of q elementsHamming distance betweenx = (x1, . . . , xn) and y = (y1, . . . , yn) in Q n

d (x, y) = min |{i : xi 6= yi }|

�������

x

���

���

d (x,y)

HHHHHHj

y

HHH

HHHY

d (y,z)

�����

������

�: z������������9d (x,z)

Triangle inequality

Page 17: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

17/48

/k

Block codes

C block code is a subset of Q n

d (C ) = min |{d (x, y) : x, y ∈ C , x 6= y }|

minimum distance of C

t(C ) = bd (C )− 1

2c

error-correcting capacity of C

Page 18: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

18/48

/k

Hamming code - 1

&%'$

&%'$

&%'$r1 r2

r3

m4

m3

m2 m1

Venn diagram of the Hamming code

Page 19: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

19/48

/k

Hamming code - 2

&%'$

&%'$

&%'$0 0

1

1

0

1 1

Venn diagram of a code word sent

Page 20: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

20/48

/k

Hamming code - 3

&%'$

&%'$

&%'$0 0

1

1

0

0 1

Venn diagram of a received word

Page 21: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

21/48

/k

Hamming code - 4

&%'$

&%'$

&%'$0 0

1

1

0

0 1

Correction of one error

Page 22: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

22/48

/k

Linear codes and their parameters

Fq the finite field with q elements, q = pe and p primeFnq is an Fq -linear vector space of dimension n

C linear code is an Fq -linear subspace of Fnq

parameters [n, k , d ]q or [n, k , d ]

q = size finite fieldn = length of Ck = dimension of Cd = minimum distance of C

Page 23: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

23/48

/k

Encoding linear code

Let C a linear code in Fnq of dimension k

It has a basis g1, . . . , gk

Let G be the k × n matrix with rows g1, . . . , gk

Then G is called a generator matrix of C

The encodingE : Fk

q −→ Fnq

of C s given by E(m) = mG

Page 24: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

24/48

/k

Singleton bound

Singleton boundd ≤ n − k + 1

Maximum Distance Separable (MDS)

d = n − k + 1

Page 25: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

25/48

/k

Inner product

The standard inner product is defined by

a · b = a1b1 + · · · + anbn

Is bilinear and non-degeneratebut "positive definite"makes no sense

Two subsets A and B of Fnq are perpendicular:

A ⊥ B if and only if a · b = 0 for all a ∈ A and b ∈ B

Page 26: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

26/48

/k

Dual code

Let C be a linear code in Fnq

The dual code is defined by

C⊥ = { x : x · c = 0 for all c ∈ C }

If C has dimension k , then C⊥ has dimension n − k

Page 27: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

27/48

/k

Star product

The star product is defined by coordinatewise multiplication

a ∗ b = (a1b1, . . . , anbn)

For two subsets A and B of Fnq

A ∗ B = 〈a ∗ b | a ∈ A and b ∈ B 〉

Page 28: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

28/48

/k

Efficient decoding algorithms

The following classes of codes:

I Generalized Reed-Solomon codesI Cyclic codesI Alternant codesI Goppa codesI Algebraic geometry codes

have efficient decoding algorithms:I Arimoto, Peterson, Gorenstein, ZierlerI Berlekamp, Massey, SakataI Justesen et al., Vladut-Skrobogatov, ...........I Error-correcting pairs

Page 29: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

29/48

/k

Error-correcting pair

Let C be a linear code in Fnq

The pair (A ,B ) of linear subcodes of Fnqm is a called a

t-error correcting pair (ECP) over Fqm for C if

E.1 (A ∗ B ) ⊥ C

E.2 k (A ) > t

E.3 d (B⊥) > t

E.4 d (A )+ d (C ) > n

Page 30: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

30/48

/k

Generalized Reed-Solomon codes- 1

Let a = (a1, . . . , an) be an n-tuple of mutually distinct elements of Fq

Let b = (b1, . . . ,bn) be an n-tuple of nonzero elements of Fq

Evaluation map:

eva,b(f (X )) = (f (a1)b1, . . . , f (an)bn)

GRSk (a, b) = { eva,b(f (X )) | f (X ) ∈ Fq [X ], deg(f (X ) < k }

Parameters: [n, k , n − k + 1] if k ≤ n

Since a polynomial of degree k − 1 has at most k − 1 zeros.

Page 31: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

31/48

/k

Generalized Reed-Solomon codes - 2

Furthermore

eva,b(f (X )) ∗ eva,c(g(X )) = eva,b∗c(f (X )g(X ))

GRSk (a, b) ∗ GRSl (a, c) = GRSk+l−1(a, b ∗ c)

Page 32: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

32/48

/k

t -ECP for GRSn−2t(a, b)

Let C⊥ = GRS2t (a, 1)

Then C = GRSn−2t (a, b) for some bhas parameters: [n, n − 2t , 2t + 1]

Let A = GRSt+1(a, 1) and B = GRSt (a, 1)

Then (A ∗ B ) ⊆ C⊥

A has parameters [n, t + 1, n − t ]B has parameters [n, t , n − t + 1]So B⊥ has parameters [n, n − t , t + 1]

Hence (A ,B ) is a t -error-correcting pair for C

Page 33: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

33/48

/k

Kernel of a received word

Let A and B be linear subspaces of Fnqm

and r ∈ Fnq a received word

Define the kernel

K (r) = { a ∈ A | (a ∗ b) · r = 0 for all b ∈ B }

LemmaLet C be an Fq -linear code of length nLet r be a received word with error vector eSo r = c+ e for some c ∈ CIf (A ∗ B ) ⊆ C⊥, then

K (r) = K (e)

Page 34: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

34/48

/k

Kernel for a GRS code

Let A = GRSt+1(a, 1) and B = GRSt (a, 1) and C = 〈A ∗ B 〉⊥

Letai = eva,1(X i−1) for i = 1, . . . , t + 1bj = eva,1(X j ) for j = 1, . . . , thl = eva,1(X l ) for l = 1, . . . , 2t

Thena1, . . . , at+1 is a basis of Ab1, . . . , bt is a basis of Bh1, . . . , h2t is a basis of C⊥

Furthermoreai ∗ bj = eva,1(X i+j−1) = hi+j−1

Page 35: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

35/48

/k

Matrix of syndromes for a GRS code

Let r be a received word and(s1, . . . , s2t ) = rH T its syndromeThen

(bj ∗ ai ) · r = si+j−1.

To compute the kernel K (r) we have to computethe null space of the matrix of syndromes

s1 s2 · · · st st+1

s2 s3 · · · st+1 st+2...

.... . .

......

st st+1 · · · s2t−1 s2t

Page 36: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

36/48

/k

Error location

Let (A ,B ) be a t -ECP for CLet J be a subset of {1, . . . , n}Define the subspace of A of error-locating vectors:

A (J ) = { a ∈ A | aj = 0 for all j ∈ J }

LemmaLet (A ∗ B ) ⊥ CLet e be an error vector of the received word rIf I = supp(e) = { i | ei 6= 0 }, then

A (I ) ⊆ K (r)

Page 37: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

37/48

/k

Error positions

LemmaLet (A ∗ B ) ⊥ CLet e be an error vector of the received word rAssume d (B⊥) > wt(e) = tIf I = supp(e) = { i | ei 6= 0 }, then

A (I ) = K (r)

If a is a nonzero element of K (r)J zero positions of aThen

I ⊆ J

Page 38: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

38/48

/k

Basic algorithm

Let (A ,B ) be a t -ECP for C with d (C ) ≥ 2t + 1Suppose that c ∈ C is the code word sent and r = c+ e isthe received word for some error vector e with wt(e) ≤ t

The basic algorithm for the code C :- Compute the kernel K (r)

This kernel is nonzero since k (A ) > t- Take a nonzero element a of K (r)

K (r) = K (e) since (A ∗ B ) ⊥ C- Determine the set J of zero positions of a

supp(e) ⊆ J since d (B⊥) > t- Compute the error values by erasure decoding

|J | < d (C ) since n − d (A ) < d (C )

Page 39: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

39/48

/k

t -ECP corrects t errors efficiently

Theorem

Let C be an Fq -linear code of length nLet (A ,B ) be a t -error-correcting pair over Fqm for C

Then the basic algorithm corrects t errorsfor the code C with complexity O((mn)3)

Page 40: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

40/48

/k

Code based PKC systems - 1

McEliece:Let C be a class of codes that haveefficient decoding algorithms correcting t errors with t ≤ (d − 1)/2

Secret key: (S ,G , P )

– S an invertible k × k matrix– G a k × n generator matrix of a code C in C.– P an n × n permutation matrix

Public key: G ′ = SGP

Page 41: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

41/48

/k

Code based PKC systems - 2

McEliece:

Encryption with public key G ′ = SGP and message m in Fkq :

y = mG ′ + e

with random chosen e in Fnq of weight t

Decryption with secret key (S ,G , P ):

yP−1= (mG ′ + e)P−1

= mSG + eP−1

SG and G are generator matrices of the same code CeP−1 has weight tDecoder gives c = mSG as closest codeword

Page 42: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

42/48

/k

Code based PKC systems - 3

Minimum distance decoding is NP-hard(Berlekamp-McEliece-Van Tilborg)

It is assumed that:

1. P 6= NP

2. Decoding up to half the minimum distance is hard

3. One cannot distinguish nor retrieve the original code bydisguising it by S and P

Page 43: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

43/48

/k

Attacks on code based PKC systems - 1

Generic attack – decoding algorithms:

– McEliece 1978.....– Brickell, Lee 1988– Leon 1988– van Tilburg 1988– Stern 1989– Canteaut, Chabaud, Sendrier 1998– Finiasz-Sendrier 2009– Bernstein-Lange-Peters 2008-2011– Becker-Joux-May-Meurer Eurocrypt 2012

Page 44: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

44/48

/k

Attacks on code based PKC systems - 2

Structural attacks:

– GRS codes (Sidelnikov-Shestakov)– subcodes of GRS codes (Wieschebrink, Márquez-Martínez-P)– Alternant codes: open– Goppa codes: open– Algebraic geometry codes: (Faure-Minder, genus g ≤ 2)– VSAG codes: (Márquez-Martínez-P-Ruano, arbitrary g)– Polynomial attack on AG codes: (Couvreur-Márquez-P, using ECP’s)

Page 45: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

45/48

/k

Codes with t -ECP

P (n, t , q) is the collection of pairs (A ,B ) that satisfy

E .2 k (A ) > tE .3 d (B⊥) > tE .5 d (A⊥) > 1E .6 d (A )+ 2t > n

LetC = Fn

q ∩ (A ∗ B )⊥

Then d (C ) is at least 2t + 1and (A ,B ) is a t -ECP for C

Page 46: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

46/48

/k

ECP one-way function

F (n, t , q) is the collection of Fq -linear codesof length n and minimum distance d ≥ 2t + 1

Consider the following map

ϕ(n,t ,q) : P (n, t , q) −→ F (n, t , q)

(A ,B ) 7−→ C

Question:Is this a one-way function?

Page 47: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

47/48

/k

Conclusion

I Many known classes of codesI that have decoding algorithm correcting t -errorsI have a t -ECPI and are not suitable for a code based PKC

Question for future researchIs the ECP map a one-way function?

Page 48: Code Based Cryptology at TU/eruudp/ambassador/15-11-12-slides.../k Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University

48/48

/k

Thank you for your attention!