🤖 AI Summary
This paper challenges the security of twisted generalized Reed–Solomon (TGRS) and twisted Reed–Solomon (TRS) codes in the McEliece cryptosystem, specifically targeting the widely believed resistance of single-twist (ℓ = 1) TGRS codes to Schur product attacks.
Method: We discover that the Schur square of single-twist TGRS codes exhibits a distinguishable low-dimensional algebraic structure. Leveraging shortening and subfield subcodes, we efficiently identify this structure and devise the first polynomial-time key-recovery attack—requiring no decoding assumptions.
Contribution/Results: Our attack breaks the Beelen et al. (2018) scheme in practice. The core innovation lies in uncovering the abnormally low-rank property of the Schur square of single-twist TGRS codes, enabling the design of an efficient distinguisher and a deterministic key-recovery algorithm. This conclusively refutes the original security claim that single-twist TGRS codes resist Schur-square-based cryptanalysis.
📝 Abstract
Twisted generalized Reed-Solomon (TGRS) codes constitute an interesting family of evaluation codes, containing a large class of maximum distance separable codes non-equivalent to generalized Reed-Solomon (GRS) ones. Moreover, the Schur squares of TGRS codes may be much larger than those of GRS codes with same dimension. Exploiting these structural differences, in 2018, Beelen, Bossert, Puchinger and Rosenkilde proposed a subfamily of Maximum Distance Separable (MDS) Twisted Reed-Solomon (TRS) codes over $mathbb{F}_q$ with $ell$ twists $q approx n^{2^{ell}}$ for McEliece encryption, claiming their resistance to both Sidelnikov Shestakov attack and Schur products--based attacks. In short, they claimed these codes to resist to classical key recovery attacks on McEliece encryption scheme instantiated with Reed-Solomon (RS) or GRS codes. In 2020, Lavauzelle and Renner presented an original attack on this system based on the computation of the subfield subcode of the public TRS code. In this paper, we show that the original claim on the resistance of TRS and TGRS codes to Schur products based--attacks is wrong. We identify a broad class of codes including TRS and TGRS ones that is distinguishable from random by computing the Schur square of some shortening of the code. Then, we focus on the case of single twist (i.e., $ell = 1$), which is the most efficient one in terms of decryption complexity, to derive an attack. The technique is similar to the distinguisher-based attacks of RS code-based systems given by Couvreur, Gaborit, Gauthier-Uma~na, Otmani, Tillich in 2014.