The existence of some structure in a code can lead to the decrease of security of the whole system built on it. Often subcodes are used to “disguise” the code as a “generallooking” one. However, the security of subcodes, whose Hadamard square is equal to the square of the original code, can be reduced to the security of this code. The paper finds the limiting conditions on the number of vectors of degree r whose removing retains this weakness for Reed - Muller subcodes and, accordingly, conditions for it to vanish. For r = 2 the exact structure of all resistant subcodes has been found. For an arbitrary code RM(r, m), the desired number of vectors to remove for providing the security has been estimated from both sides. Finally, the ratio of subcodes with Hadamard square unequal to the square of the original code has been proved to tend to zero if additional conditions on the codimension of the subcode and the parameter r are imposed and m → ∞. Thus, the implementation of checks proposed in the paper helps to immediately filter out some insecure subcodes.
Download file
Counter downloads: 37
- Title Characteristics of Hadamard square of special Reed - Muller subcodes
- Headline Characteristics of Hadamard square of special Reed - Muller subcodes
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 53
- Date:
- DOI 10.17223/20710410/53/5
Keywords
post-quantum cryptography, code-based cryptography, Reed-Muller subcodes, Hadamard product, McEliece cryptosystem, Reed-Muller codesAuthors
References
Rodl V. On a Packing and Covering Problem. European J. Combinatorics, 1985, vol. 6, no. 1, pp.69-78.
Erdos P. and Spencer J. Probabilistic Methods in Combinatorics. Budapest, Akademiai Kiado, 1974. 106 p.
Couvreur A., Gaborit P., Gauthier-Umana V., et al. Distinguisher-based attacks on public-key cryptosystems using Reed - Solomon codes. Designs, Codes, Cryptogr., 2014, vol. 73, no. 2, pp.641-666.
Chizhov I. V. and Borodin M. A. Hadamard products classification of subcodes of Reed - Muller codes codimension 1. Discr. Math. Appl., 2020, vol.32, no. 1, pp. 115-134.
Borodin M. A. and Chizhov I. V. Effective attack on the McEliece cryptosystem based on Reed - Muller codes. Discr. Math. Appl., 2014, vol. 24, no. 5, pp. 273-280.
Minder L. and Shokrollahi A. Cryptanalysis of the Sidelnikov cryptosystem. LNCS, vol. 4515, pp. 347-360.
Couvreur A., Marquez-Corbella I., and Pellikaan R. Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes. Coding Theory Appl.ications. CIM Ser. Math. Sci., 2015, vol. 3, pp. 133-140.
Lee Y., Lee W., Kim Y. S., and No J.-S. Modified pqsig RM: RM code-based signature scheme. IEEE Access, 2020, vol. 8, pp. 177506-177518.
Berger T. P. and Loidreau P. How to mask the structure of codes. Designs, Codes, Cryptogr., 2005, vol. 35, no. 1, pp. 63-79.
Wieschebrink C. Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. LNCS, 2010, vol. 6061, pp. 61-72.
Wieschebrink C. An attack on a modified Niederreiter encryption scheme. LNCS, 2006, vol. 3958, pp. 14-26.
Niederreiter H. Knapsack-type cryptosystems and algebraic coding theory. Problems Control Inform. Theory, 1986, vol. 15, no. 2, pp. 159-166.
https://csrc.nist.gov/Projects/post-quantum-cryptography/Post-Quantum-Crypto graphy-Standardization/Call-for-Proposals - NIST Call for Proposals, 2016.
McEliece R. J. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, 1978, vol.4244, pp. 114-116.
Shor P. V. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Computing, 1997, vol.26, no. 5, pp. 1484-1509.

Characteristics of Hadamard square of special Reed - Muller subcodes | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2021. № 53. DOI: 10.17223/20710410/53/5
Download full-text version
Counter downloads: 108