Page 59 - ISCI’2017
P. 59

*
            encode a codogramm c x using the known generating matrix GX. However, random code decoding
            (with appropriate parameters n, k, q and wh(e)) is computationally unattainable. Without the matrices
            X, P and D an attacker cannot restore a matrix G and will use a decoding algorithm of polynomial

            complexity. Based on  this, volume  wh(e)    should maximize,  for example,  at  wh(e) = t  decoding
            complexity will be maximal, this ensures the highest level of resistance for code cryptosystem at the

            specified parameters n, k, q.
                  For an authorized user (who knows a secret key) decoding is polynomial solvable problem.

                                                                                            *
                                                                                                           1
                                                                                                 *
                                                                                                      1
                                                                      *
                                                                                                      −
                                                                                                          −
            Really, an authorized user, when he/she obtains a vector c x, will build a vector с =  с ⋅ D ⋅ P .
                                                                                                 X
            Matrix  Λ  =  PD  saves a weight  and the Hamming distance,  i.e. for any code words  c  and c' the
            following equalities are performed:
                                         w h (c ) = w h ( Λc  ),  w h (c  ) ' ,c  = w h ( Λ cc  ' , Λ ).
                                              *
                  This means that the vector с  is distorted in no more than in t-ary by the code word of the
            algebraic code with the generating matrix G and it can be decoded by the fast algorithm of polynomial

            complexity [19].
                  An authorized,  using the algorithm of polynomial complexity,  is decoded the vector

              *
                                                                                                      −
                                                                                                       1
             с =  I ⋅ ' G +  ' e , i.e. will find  'I . After this, this user calculate k-ary information vector  = II  ' X .
                  Thus, the primary means of masking for the linear block (n, k, d)-code over linear random code
            (general position code) in the McEliece cryptosystem are the matrices X, P and D. Additional secret

            parameter, which can be used in a case of the Goppa codes, is the Goppa polynomial G(x), or, more
            broadly, the vector Y = (Y0, Y1, …, Yn-1) in a case of alternantive codes (see the expressions (15)-(17)).

            Template change  is  not decrease  structural code characteristics,  i.e.  from a  point of  view of
            cryptographic transformations, not lead to a reduction in security. However, knowledge about vector-

            template Y = (Y0, Y1, …, Yn-1) (or the polynomial G(x)) is a necessary for the correct decoding of

            information message, i.e. for correct decryption at the receiving side.
                  A large number of different attacks on crypto code of the information protection scheme [19,

            33 - 36] has been published in nowadays, some of which were quite effective about individual variants
            of code cryptosystems. However, the basic scheme [15], which has been proposed about 40 years

            ago,  remains  resistant to all known cryptanalysis  methods,  including  in case of using  quantum-
            computing systems.

                  The most natural way in a development of cryptanalysis methods for the McEliece code scheme

            is using non-algebraic decoding methods. Really, if there exists computationally efficient method for
            decoding the code word (19) only by known generating matrix (18), then the information message I

            can be effectively restored and without the knowledge of the secret key (matrices X, P and D).


                                                                                                          59
   54   55   56   57   58   59   60   61   62   63   64