Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems

For the practical application of code cryptosystems such as McEliece, it is necessary that the code used in the cryptosystem should have a fast decoding algorithm. On the other hand, the code used must be such that finding a secret key from a known public key would be impractical with a relatively s...

Full description

Bibliographic Details
Main Authors: Vladimir Mikhailovich Deundyak, Yury Vladimirovich Kosolapov, Evgeniy Andreevich Leluk
Format: Article
Language:English
Published: Yaroslavl State University 2017-04-01
Series:Modelirovanie i Analiz Informacionnyh Sistem
Subjects:
Online Access:https://www.mais-journal.ru/jour/article/view/512
id doaj-c4e440565ecd455cac3df03508268de6
record_format Article
spelling doaj-c4e440565ecd455cac3df03508268de62021-07-29T08:15:14ZengYaroslavl State UniversityModelirovanie i Analiz Informacionnyh Sistem1818-10152313-54172017-04-0124223925210.18255/1818-1015-2017-2-239-252365Decoding the Tensor Product of MLD Codes and Applications for Code CryptosystemsVladimir Mikhailovich Deundyak0Yury Vladimirovich Kosolapov1Evgeniy Andreevich Leluk2FGNU NII "Specvuzavtomatika" South Federal UniversitySouth Federal UniversitySouth Federal UniversityFor the practical application of code cryptosystems such as McEliece, it is necessary that the code used in the cryptosystem should have a fast decoding algorithm. On the other hand, the code used must be such that finding a secret key from a known public key would be impractical with a relatively small key size. In this connection, in the present paper it is proposed to use the tensor product \( C_1 \otimes C_2 \) of group \(\textrm{MLD}\) codes \( C_1 \) and \( C_2 \) in a McEliece-type cryptosystem. The algebraic structure of the code \( C_1 \otimes C_2 \) in the general case differs from the structure of the codes \( C_1 \) and \( C_2 \), so it is possible to build stable cryptosystems of the McEliece type even on the basis of codes \( C_i \) for which successful attacks on the key are known. However, in this way there is a problem of decoding the code \( C_1 \otimes C_2 \). The main result of this paper is the construction and justification of a set of fast algorithms needed for decoding this code. The process of constructing the decoder relies heavily on the group properties of the code \( C_1 \otimes C_2 \). As an application, the McEliece-type cryptosystem is constructed on the code \( C_1 \otimes C_2 \) and an estimate is given of its resistance to attack on the key under the assumption that for code cryptosystems on codes \( C_i \) an effective attack on the key is possible. The results obtained are numerically illustrated in the case when \( C_1 \), \( C_2 \) are Reed--Muller--Berman codes for which the corresponding code cryptosystem was hacked by L. Minder and A. Shokrollahi (2007).https://www.mais-journal.ru/jour/article/view/512majority decoderreed–muller–berman codestensor product codes
collection DOAJ
language English
format Article
sources DOAJ
author Vladimir Mikhailovich Deundyak
Yury Vladimirovich Kosolapov
Evgeniy Andreevich Leluk
spellingShingle Vladimir Mikhailovich Deundyak
Yury Vladimirovich Kosolapov
Evgeniy Andreevich Leluk
Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
Modelirovanie i Analiz Informacionnyh Sistem
majority decoder
reed–muller–berman codes
tensor product codes
author_facet Vladimir Mikhailovich Deundyak
Yury Vladimirovich Kosolapov
Evgeniy Andreevich Leluk
author_sort Vladimir Mikhailovich Deundyak
title Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
title_short Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
title_full Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
title_fullStr Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
title_full_unstemmed Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
title_sort decoding the tensor product of mld codes and applications for code cryptosystems
publisher Yaroslavl State University
series Modelirovanie i Analiz Informacionnyh Sistem
issn 1818-1015
2313-5417
publishDate 2017-04-01
description For the practical application of code cryptosystems such as McEliece, it is necessary that the code used in the cryptosystem should have a fast decoding algorithm. On the other hand, the code used must be such that finding a secret key from a known public key would be impractical with a relatively small key size. In this connection, in the present paper it is proposed to use the tensor product \( C_1 \otimes C_2 \) of group \(\textrm{MLD}\) codes \( C_1 \) and \( C_2 \) in a McEliece-type cryptosystem. The algebraic structure of the code \( C_1 \otimes C_2 \) in the general case differs from the structure of the codes \( C_1 \) and \( C_2 \), so it is possible to build stable cryptosystems of the McEliece type even on the basis of codes \( C_i \) for which successful attacks on the key are known. However, in this way there is a problem of decoding the code \( C_1 \otimes C_2 \). The main result of this paper is the construction and justification of a set of fast algorithms needed for decoding this code. The process of constructing the decoder relies heavily on the group properties of the code \( C_1 \otimes C_2 \). As an application, the McEliece-type cryptosystem is constructed on the code \( C_1 \otimes C_2 \) and an estimate is given of its resistance to attack on the key under the assumption that for code cryptosystems on codes \( C_i \) an effective attack on the key is possible. The results obtained are numerically illustrated in the case when \( C_1 \), \( C_2 \) are Reed--Muller--Berman codes for which the corresponding code cryptosystem was hacked by L. Minder and A. Shokrollahi (2007).
topic majority decoder
reed–muller–berman codes
tensor product codes
url https://www.mais-journal.ru/jour/article/view/512
work_keys_str_mv AT vladimirmikhailovichdeundyak decodingthetensorproductofmldcodesandapplicationsforcodecryptosystems
AT yuryvladimirovichkosolapov decodingthetensorproductofmldcodesandapplicationsforcodecryptosystems
AT evgeniyandreevichleluk decodingthetensorproductofmldcodesandapplicationsforcodecryptosystems
_version_ 1721256733381230592