Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes

  title={Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes},
  author={Alain Couvreur and Irene Marquez Corbella and Ruud Pellikaan},
We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebraic geometry (AG) codes. The proposed attack reposes on the distinguishability of such codes from random codes using the Schur product. Wieschebrink treated the genus zero case a few years ago but his approach cannot be extent straightforwardly to other genera. We address this problem by introducing and using a new notion, which we call the t–closure of a code. 
Recent Discussions
This paper has been referenced on Twitter 3 times over the past 90 days. VIEW TWEETS

From This Paper

Figures, tables, results, connections, and topics extracted from this paper.
4 Extracted Citations
27 Extracted References
Similar Papers

Referenced Papers

Publications referenced by this paper.
Showing 1-10 of 27 references

On the insecurity of cryptosystems based on generalized Reed-Solomon codes

  • V. M. Sidelnikov, S. O. Shestakov
  • Discrete Math. 2, 439–444
  • 1992
Highly Influential
7 Excerpts

A public-key cryptosystem based on algebraic coding theory

  • R. J. McEliece
  • DSN Progress Report 42–44, 114–116
  • 1978
Highly Influential
7 Excerpts

On decoding linear codes by error correcting pairs

  • R. Pellikaan
  • 1988
Highly Influential
6 Excerpts

Knapsack-type cryptosystems and algebraic coding theory

  • H. Niederreiter
  • Problems of Control and Information Theory 15(2…
  • 1986
Highly Influential
4 Excerpts

A Polyn mial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems

  • A. Couvreur, I. Márquez-Corbella, R. Pellikaan
  • Accepted for the conference ISIT
  • 2014

Computational aspects of retrieving a representation of an algebraic geometry code

  • I. Márquez-Corbella, E. Martı́nez-Moro, R. Pellikaan, D. Ruano
  • J. Symbolic Comput. 64(0), 67 – 87
  • 2014
1 Excerpt

Similar Papers

Loading similar papers…