On the structure of the Schur squares of Twisted Generalized Reed-Solomon codes and application to cryptanalysis

📅 2024-12-19
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper challenges the security of twisted generalized Reed–Solomon (TGRS) and twisted Reed–Solomon (TRS) codes in the McEliece cryptosystem, specifically targeting the widely believed resistance of single-twist (ℓ = 1) TGRS codes to Schur product attacks. Method: We discover that the Schur square of single-twist TGRS codes exhibits a distinguishable low-dimensional algebraic structure. Leveraging shortening and subfield subcodes, we efficiently identify this structure and devise the first polynomial-time key-recovery attack—requiring no decoding assumptions. Contribution/Results: Our attack breaks the Beelen et al. (2018) scheme in practice. The core innovation lies in uncovering the abnormally low-rank property of the Schur square of single-twist TGRS codes, enabling the design of an efficient distinguisher and a deterministic key-recovery algorithm. This conclusively refutes the original security claim that single-twist TGRS codes resist Schur-square-based cryptanalysis.

Technology Category

Application Category

📝 Abstract
Twisted generalized Reed-Solomon (TGRS) codes constitute an interesting family of evaluation codes, containing a large class of maximum distance separable codes non-equivalent to generalized Reed-Solomon (GRS) ones. Moreover, the Schur squares of TGRS codes may be much larger than those of GRS codes with same dimension. Exploiting these structural differences, in 2018, Beelen, Bossert, Puchinger and Rosenkilde proposed a subfamily of Maximum Distance Separable (MDS) Twisted Reed-Solomon (TRS) codes over $mathbb{F}_q$ with $ell$ twists $q approx n^{2^{ell}}$ for McEliece encryption, claiming their resistance to both Sidelnikov Shestakov attack and Schur products--based attacks. In short, they claimed these codes to resist to classical key recovery attacks on McEliece encryption scheme instantiated with Reed-Solomon (RS) or GRS codes. In 2020, Lavauzelle and Renner presented an original attack on this system based on the computation of the subfield subcode of the public TRS code. In this paper, we show that the original claim on the resistance of TRS and TGRS codes to Schur products based--attacks is wrong. We identify a broad class of codes including TRS and TGRS ones that is distinguishable from random by computing the Schur square of some shortening of the code. Then, we focus on the case of single twist (i.e., $ell = 1$), which is the most efficient one in terms of decryption complexity, to derive an attack. The technique is similar to the distinguisher-based attacks of RS code-based systems given by Couvreur, Gaborit, Gauthier-Uma~na, Otmani, Tillich in 2014.
Problem

Research questions and friction points this paper is trying to address.

Cryptography
McEliece Encryption
Code Security
Innovation

Methods, ideas, or system contributions that make the work stand out.

Twisted Reed-Solomon Codes
Cryptographic Vulnerabilities
Attack Strategies
🔎 Similar Papers
No similar papers found.
Alain Couvreur
Alain Couvreur
INRIA & LIX, École Polytechnique
Mathématiques
Rakhi Pratihar
Rakhi Pratihar
Inria & Laboratoire LIX, École Polytechnique
AlgebraCoding TheoryCombinatoricsMatroid Theoryq-Simplicial Complexes
N
Nihan Tanisali
Inria, Laboratoire LIX, CNRS UMR 7161, École Polytechnique, Institut Polytechnique de Paris
I
Ilaria Zappatore
XLIM, CNRS UMR 7252, Université de Limoges