2021
DOI: 10.1007/s10623-021-00972-7
|View full text |Cite
|
Sign up to set email alerts
|

Extending Coggia–Couvreur attack on Loidreau’s rank-metric cryptosystem

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Furthermore, a straightforward verification shows that one can decrypt any ciphertext in polynomial time with the knowledge of G ′ and M ′ . This suggests that the cryptosystem degenerates into a sub-instance of Loidreau's proposal [4], which has been completely broken in some cases [29][30][31]. Hence choosing φ to be fully linear over F q n may bring some security problems.…”
Section: On the Choice Of φmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, a straightforward verification shows that one can decrypt any ciphertext in polynomial time with the knowledge of G ′ and M ′ . This suggests that the cryptosystem degenerates into a sub-instance of Loidreau's proposal [4], which has been completely broken in some cases [29][30][31]. Hence choosing φ to be fully linear over F q n may bring some security problems.…”
Section: On the Choice Of φmentioning
confidence: 99%
“…Not long after Coggia and Couvreur's work, this attack was generalized to the case of λ = 3 by Ghatak [30] and then by Duc and Loidreau [31].…”
Section: Structural Attacksmentioning
confidence: 99%
“…In their cryptosystem, the published information consists of a generator matrix of the disturbed Gabidulin code by a random code that admits maximum rank weight n and a random vector of column rank n. This technique of masking the structure of Gabidulin codes, as claimed by Lau and Tan, can prevent some existing attacks [9][10][11][12]. Additionally, the recent Coggia-Couvreur attack [13] and Ghatak's attack [15] do not work on this cryptosystem either.…”
Section: Introductionmentioning
confidence: 99%