The GPT cryptosystem ( Gabidulina-Paramonova-Tretyakov ) is a public -key cryptosystem based on rank codes [1] , developed in 1991 by E. M. Gabidulin , A. V. Paramonov and O. V. Tretyakov [2] based on the cryptosystem McEliece .
This cryptosystem, unlike the McEliece cryptosystem, is more resistant to decoding attacks, and also has a smaller key size [3] , which is better suited for practical use.
Most versions of the system were hacked by R. Overbeck [4] .
Content
Description
Clear Text
As plain text, any -vector , .
Public Key
The public key is a size generating matrix :
- ,
Where:
- - generating matrix code with maximum rank distance for code length with number of characters defined by a matrix of the following form:
-
- Where - any set of elements of the extended field linearly independent over the field .
- Where - any set of elements of the extended field linearly independent over the field .
- main matrix used to correct errors. Errors of a rank no more can be fixed.
-
- String scrambler Is a non-degenerate square order matrix over the field
- - size distortion matrix over the field with column rank | and rank | .
- Matrix has a column rank | .
- Column scrambler - square order matrix over the field .
- maybe more but .
Private Key
The private key is a set as well as an algorithm for fast decoding of MPP code, which uses a parity check matrix such that
- ,
- Where - elements of the extended field linearly independent over the main field
- Matrix It is not used to decrypt crypto text and can be deleted after calculating the private key.
- ,
Optimal code parameters
- Code length ,
- Dimension ,
- Code Rank Distance
Encryption
The corresponding plaintext cryptotext is calculated as follows:
- ,
- ,
Where - artificial error vector of rank not higher , and {\ displaystyle t_ {1} + t_ {2} \ leq t = \ lfloor {\ tfrac {nk} {2}} \ rfloor} .
Decryption
Legal recipient receiving , performs the following actions:
- Calculates
- Of selects a subvector where - subvector
- Applies fast decoding algorithm to correct error
- Gets
- Restores
In this system, the size of the public key is bit, and information transfer rate .
Hacking
Frobenius automorphism
We introduce the Frobenius automorphism : . It has the following properties:
- For matrix over the same field
- For any integer s :
- In general . Equality is achieved if - matrix above the main field
Overback attack description [4]
- The cryptanalyst calculates the extended public key from the public key:
- Here property 7 of the Frobenius automorphism is used: , because - matrix above the main field .
-
- Rewrites this matrix as ,
- Where
- ,
- , .
- ,
- Selects .
- Defines matrices:
- derived from deleting the last line,
- derived from deleting the first line.
- derived from deleting the first line.
- derived from deleting the last line,
- Defines a linear display. : according to the following rule:
- if a then
- if a then
- Writes down
- Using matrix transformations, the extended public key is brought to the form:
- Where - generating matrix MPP code.
- Trying to find a solution to the system.
- ,
- Where - row vector above the extended field lengths
- Represents Vector as:
-
- Where - length sub-vector , but - lengths
- Now the system of equations is equivalent to the following:
- Assuming the condition is true , we see that the above system has only a trivial solution . Therefore, the first equation from the system is converted to the form:
- .
This will allow you to find the first row of the parity check matrix for the code with this generating matrix . Therefore, this solution breaks the described cryptosystem in polynomial time. Overbeck attack requires field operations , since each attack step has a complexity not higher than cubic on .
Notes
- ↑ Gabidulin E. M. Theory of Codes with Maximum Rank Distance (Unavailable Link) // Probl. transmission inform. - 1985. - T. 21, no. 1 .-- S. 3-16.
- ↑ Gabidulin EM, Paramonov AV, Tretjakov OV Ideals over a Non-commutative Ring and Their Application in Cryptology // Advances in Cryptology - Eurocrypt '91, LNCS 547, 1991, pp. 482-489.
- ↑ Khan E., Gabidulin EM, Honary B., Ahmed H. Modified Niederreiter type of GPT Cryptosystem based on Reducible Rank Codes // et al. Des. Codes Cryptogr. (2014) 70: 231. - ISSN 0925-1022
- ↑ 1 2 Overbeck R. Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes // Journal of Cryptology : volume 21, number 2, april 2008 - ISSN 0933-2790
Literature
- Gabidulin, E. M., Pilipchuk, N.I., Honari B., and Rashvan H. Information Security in a Network with Random Network Encoding // Probl. transmission inform. , 2013, Volume 49, Issue 2, 92-106
- Gadouleau M., Yan Zh. Security of GPT-type cryptosystems // Proc. 2006 IEEE Int. Sympos. on Information Theory (ISIT'2006) . - ISIT.2006.261627
- Rashwan H., Gabidulin EM, Honary B. A smart approach for GPT Cryptosystem Based on Rank Codes // Proc. 2010 IEEE Int. Sympos. on Information Theory (ISIT'2010). Austin, Texas, USA. June 13-18, 2010. P. 2463-2467.
- Kshevetskiy AS Security of GPT-like cryptosystems based on linear rank codes // Signal Design and Its Applications in Communications, 2007. IWSDA 2007 . On page (s): 143-147.
- Ourivski AV, Gabidulin EM Column Scrambler for the GPT Cryptosystem // Discrete Applied Mathematics. 128 (1): 207-221 (2003).
- Overbeck R. Extending Gibson's attacks on the GPT cryptosystem // In Proc. of WCC 2005, volume 3969 of LNCS, pp. 178-188, Springer Verlag, 2006.