Skip to main content

Showing 1–14 of 14 results for author: Bardet, M

  1. arXiv:2304.14757  [pdf, ps, other

    cs.IT cs.CR

    Polynomial time key-recovery attack on high rate random alternant codes

    Authors: Magali Bardet, Rocco Mora, Jean-Pierre Tillich

    Abstract: A long standing open question is whether the distinguisher of high rate alternant codes or Goppa codes \cite{FGOPT11} can be turned into an algorithm recovering the algebraic structure of such codes from the mere knowledge of an arbitrary generator matrix of it. This would allow to break the McEliece scheme as soon as the code rate is large enough and would break all instances of the CFS signature… ▽ More

    Submitted 29 May, 2023; v1 submitted 28 April, 2023; originally announced April 2023.

  2. arXiv:2208.05471  [pdf, ps, other

    cs.CR

    Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem

    Authors: Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich

    Abstract: The Rank Decoding problem (RD) is at the core of rank-based cryptography. This problem can also be seen as a structured version of MinRank, which is ubiquitous in multivariate cryptography. Recently, \cite{BBBGNRT20,BBCGPSTV20} proposed attacks based on two new algebraic modelings, namely the MaxMinors modeling which is specific to RD and the Support-Minors modeling which applies to MinRank in gen… ▽ More

    Submitted 14 June, 2023; v1 submitted 10 August, 2022; originally announced August 2022.

  3. arXiv:2208.01442  [pdf, ps, other

    cs.CR cs.IT cs.SC

    Improvement of algebraic attacks for solving superdetermined MinRank instances

    Authors: Magali Bardet, Manon Bertin

    Abstract: The MinRank (MR) problem is a computational problem that arises in many cryptographic applications. In Verbel et al. (PQCrypto 2019), the authors introduced a new way to solve superdetermined instances of the MinRank problem, starting from the bilinear Kipnis-Shamir (KS) modeling. They use linear algebra on specific Macaulay matrices, considering only multiples of the initial equations by one bloc… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Journal ref: PQCrypto 2022, Sep 2022, virtual, France

  4. arXiv:2103.03558  [pdf, ps, other

    cs.CR

    An algebraic approach to the Rank Support Learning problem

    Authors: Magali Bardet, Pierre Briaud

    Abstract: Rank-metric code-based cryptography relies on the hardness of decoding a random linear code in the rank metric. The Rank Support Learning problem (RSL) is a variant where an attacker has access to N decoding instances whose errors have the same support and wants to solve one of them. This problem is for instance used in the Durandal signature scheme. In this paper, we propose an algebraic attack o… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

  5. arXiv:2102.02544  [pdf, ps, other

    cs.IT

    Decoding Reed-Solomon codes by solving a bilinear system with a Gröbner basis approach

    Authors: Magali Bardet, Rocco Mora, Jean-Pierre Tillich

    Abstract: Decoding a Reed-Solomon code can be modeled by a bilinear system which can be solved by Gröbner basis techniques. We will show that in this particular case, these techniques are much more efficient than for generic bilinear systems with the same number of unknowns and equations (where these techniques have exponential complexity). Here we show that they are able to solve the problem in polynomial… ▽ More

    Submitted 6 July, 2021; v1 submitted 4 February, 2021; originally announced February 2021.

    Comments: Additional references have been added

  6. Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems

    Authors: Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier Verbel

    Abstract: Rank Decoding (RD) is the main underlying problem in rank-based cryptography. Based on this problem and quasi-cyclic versions of it, very efficient schemes have been proposed recently, such as those in the ROLLO and RQC submissions, which have reached the second round of the NIST Post-Quantum competition. Two main approaches have been studied to solve RD: combinatorial ones and algebraic ones. Whi… ▽ More

    Submitted 9 February, 2021; v1 submitted 14 February, 2020; originally announced February 2020.

  7. An Algebraic Attack on Rank Metric Code-Based Cryptosystems

    Authors: Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Vincent Neiger, Olivier Ruatta, Jean-Pierre Tillich

    Abstract: The Rank metric decoding problem is the main problem considered in cryptography based on codes in the rank metric. Very efficient schemes based on this problem or quasi-cyclic versions of it have been proposed recently, such as those in the submissions ROLLO and RQC currently at the second round of the NIST Post-Quantum Cryptography Standardization Process. While combinatorial attacks on this prob… ▽ More

    Submitted 23 February, 2020; v1 submitted 2 October, 2019; originally announced October 2019.

    Comments: Eurocrypt 2020

  8. Practical Algebraic Attack on DAGS

    Authors: Magali Bardet, Manon Bertin, Alain Couvreur, Ayoub Otmani

    Abstract: DAGS scheme is a key encapsulation mechanism (KEM) based on quasi-dyadic alternant codes that was submitted to NIST standardization process for a quantum resistant public key algorithm. Recently an algebraic attack was devised by Barelli and Couvreur (Asiacrypt 2018) that efficiently recovers the private key. It shows that DAGS can be totally cryptanalysed by solving a system of bilinear polynomia… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 16 pages, accepted for publication in the 7th Code-Based Cryptography Workshop 2019

  9. Permutation Code Equivalence is not Harder than Graph Isomorphism when Hulls are Trivial

    Authors: Magali Bardet, Ayoub Otmani, Mohamed Saeed-Taha

    Abstract: The paper deals with the problem of deciding if two finite-dimensional linear subspaces over an arbitrary field are identical up to a permutation of the coordinates. This problem is referred to as the permutation code equivalence. We show that given access to a subroutine that decides if two weighted undirected graphs are isomorphic, one may deterministically decide the permutation code equivalenc… ▽ More

    Submitted 30 April, 2019; originally announced May 2019.

    Comments: Accepted to 2019 IEEE International Symposium on Information Theory

  10. Algebraic Properties of Polar Codes From a New Polynomial Formalism

    Authors: Magali Bardet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich

    Abstract: Polar codes form a very powerful family of codes with a low complexity decoding algorithm that attain many information theoretic limits in error correction and source coding. These codes are closely related to Reed-Muller codes because both can be described with the same algebraic formalism, namely they are generated by evaluations of monomials. However, finding the right set of generating monomia… ▽ More

    Submitted 18 February, 2016; v1 submitted 22 January, 2016; originally announced January 2016.

    Comments: 14 pages * A reference to the work of Bernhard Geiger has been added (arXiv:1506.05231) * Lemma 3 has been changed a little bit in order to prove that Proposition 7.1 in arXiv:1506.05231 holds for any binary input symmetric channel

  11. arXiv:1312.4358  [pdf, ps, other

    math.AG cs.CG

    On the degree of the polynomial defining a planar algebraic curves of constant width

    Authors: Magali Bardet, Térence Bayen

    Abstract: In this paper, we consider a family of closed planar algebraic curves $\mathcal{C}$ which are given in parametrization form via a trigonometric polynomial $p$. When $\mathcal{C}$ is the boundary of a compact convex set, the polynomial $p$ represents the support function of this set. Our aim is to examine properties of the degree of the defining polynomial of this family of curves in terms of the d… ▽ More

    Submitted 16 December, 2013; originally announced December 2013.

    Comments: 13 pages

    MSC Class: 14H50; 13P05; 13P15

  12. arXiv:1312.1655  [pdf, ps, other

    cs.SC

    On the Complexity of the F5 Gröbner basis Algorithm

    Authors: Magali Bardet, Jean-Charles Faugère, Bruno Salvy

    Abstract: We study the complexity of Gröbner bases computation, in particular in the generic situation where the variables are in simultaneous Noether position with respect to the system. We give a bound on the number of polynomials of degree $d$ in a Gröbner basis computed by Faugère's $F_5$ algorithm~(Fau02) in this generic case for the grevlex ordering (which is also a bound on the number of polynomial… ▽ More

    Submitted 17 July, 2014; v1 submitted 5 December, 2013; originally announced December 2013.

    Comments: 24 pages

  13. On the Complexity of Solving Quadratic Boolean Systems

    Authors: Magali Bardet, Jean-Charles Faugère, Bruno Salvy, Pierre-Jean Spaenlehauer

    Abstract: A fundamental problem in computer science is to find all the common zeroes of $m$ quadratic polynomials in $n$ unknowns over $\mathbb{F}_2$. The cryptanalysis of several modern ciphers reduces to this problem. Up to now, the best complexity bound was reached by an exhaustive search in $4\log_2 n\,2^n$ operations. We give an algorithm that reduces the problem to a combination of exhaustive search a… ▽ More

    Submitted 25 May, 2012; v1 submitted 29 December, 2011; originally announced December 2011.

    Comments: 25 pages

    MSC Class: 68W40; 13P10; 13P15; 94A60 ACM Class: I.1.2; D.4.6

    Journal ref: Journal of Complexity, vol. 29, n. 1, pp. 53-75, 2013

  14. On formulas for decoding binary cyclic codes

    Authors: Daniel Augot, Magali Bardet, Jean-Charles Faugère

    Abstract: We adress the problem of the algebraic decoding of any cyclic code up to the true minimum distance. For this, we use the classical formulation of the problem, which is to find the error locator polynomial in terms of the syndroms of the received word. This is usually done with the Berlekamp-Massey algorithm in the case of BCH codes and related codes, but for the general case, there is no generic… ▽ More

    Submitted 10 January, 2007; originally announced January 2007.

    Journal ref: IEEE International Symposium on Information Theory, 2007 (ISIT 2007) (2007) 2646-2650