Designs, Codes and Cryptography最新文献

筛选
英文 中文
How to lose some weight: a practical template syndrome decoding attack
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-07 DOI: 10.1007/s10623-025-01603-1
Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh
{"title":"How to lose some weight: a practical template syndrome decoding attack","authors":"Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh","doi":"10.1007/s10623-025-01603-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01603-1","url":null,"abstract":"<p>We study the hardness of the Syndrome Decoding problem, the base of most code-based cryptographic schemes, such as Classic McEliece, in the presence of side-channel information. We use ChipWhisperer equipment to perform a template attack on Classic McEliece running on an ARM Cortex-M4, and accurately classify the Hamming weights of consecutive 32-bit blocks of the secret error vector <span>(textbf{e}in {{mathbb {F}}}_2^n)</span>. With these weights at hand, we optimize Information Set Decoding algorithms. Technically, we demonstrate how to speed up information set decoding via a dimension reduction, additional parity-check equations, and an improved information set search, all derived from the Hamming-weight information. Consequently, using our template attack, we can practically recover an error vector <span>(textbf{e}in {{mathbb {F}}}_2^n)</span> in dimension <span>(n=2197)</span> in a matter of seconds. Without side-channel information, such an instance has a complexity of around 88 bit. We also estimate how our template attack affects the security of the proposed McEliece parameter sets. Roughly speaking, even an error-prone leak of our Hamming weight information leads for <span>(n=3488)</span> to a security drop of 89 bits.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"67 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143569772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A class of ternary codes with few weights
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-06 DOI: 10.1007/s10623-025-01605-z
Kaimin Cheng
{"title":"A class of ternary codes with few weights","authors":"Kaimin Cheng","doi":"10.1007/s10623-025-01605-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01605-z","url":null,"abstract":"<p>Let <span>(ell ^m)</span> be a power with <span>(ell )</span> a prime greater than 3 and <span>(m)</span> a positive integer such that 3 is a primitive root modulo <span>(2ell ^m)</span>. Let <span>(mathbb {F}_3)</span> be the finite field of order 3, and let <span>(mathbb {F})</span> be the <span>(ell ^{m-1}(ell -1))</span>-th extension field of <span>(mathbb {F}_3)</span>. Denote by <span>(text {Tr})</span> the absolute trace map from <span>(mathbb {F})</span> to <span>(mathbb {F}_3)</span>. For any <span>(alpha in mathbb {F}_3)</span> and <span>(beta in mathbb {F})</span>, let <span>(D)</span> be the set of nonzero solutions in <span>(mathbb {F})</span> to the equation <span>(text {Tr}(x^{frac{q-1}{2ell ^m}} + beta x) = alpha )</span>. In this paper, we investigate a ternary code <span>(mathcal {C})</span> of length <span>(n)</span>, defined by <span>(mathcal {C}:= {(text {Tr}(d_1x), text {Tr}(d_2x), dots , text {Tr}(d_nx)): x in mathbb {F}})</span> when we rewrite <span>(D = {d_1, d_2, dots , d_n})</span>. Using recent results on explicit evaluations of exponential sums, the Weil bound, and combinatorial techniques, we determine the Hamming weight distribution of the code <span>(mathcal {C})</span>. Furthermore, we show that when <span>(alpha = beta = 0)</span>, the dual code of <span>(mathcal {C})</span> is optimal with respect to the Hamming bound.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"17 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143569770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A class of triple-twisted GRS codes
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-05 DOI: 10.1007/s10623-025-01595-y
Kapish Chand Meena, Piyush Pachauri, Ambrish Awasthi, Maheshanand Bhaintwal
{"title":"A class of triple-twisted GRS codes","authors":"Kapish Chand Meena, Piyush Pachauri, Ambrish Awasthi, Maheshanand Bhaintwal","doi":"10.1007/s10623-025-01595-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01595-y","url":null,"abstract":"<p>This paper focuses on the study of triple-twisted generalized Reed–Solomon (TTGRS) codes over a finite field <span>({mathbb {F}}_q)</span>, having twists <span>(varvec{t} = (1, 2, 3))</span> and hooks <span>(varvec{h} = (0, 1, 2))</span>. We have obtained the necessary and sufficient conditions for such TTGRS codes to be MDS, AMDS, and AAMDS via algebraic techniques. We have also enumerated these codes for some particular values of the parameters. Moreover, we have presented some non-trivial examples for MDS, AMDS, and AAMDS TTGRS codes with various parameters. Further, we have studied the hulls of these codes, and under various conditions, obtained necessary and sufficient conditions for these codes to have a hull with dimensions varying from 0 to 5.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"194 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143546295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing k-ary orientable sequences with asymptotically optimal length
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-28 DOI: 10.1007/s10623-025-01581-4
Daniel Gabrić, Joe Sawada
{"title":"Constructing k-ary orientable sequences with asymptotically optimal length","authors":"Daniel Gabrić, Joe Sawada","doi":"10.1007/s10623-025-01581-4","DOIUrl":"https://doi.org/10.1007/s10623-025-01581-4","url":null,"abstract":"<p>An orientable sequence of order <i>n</i> over an alphabet<span>({0,1,ldots , k{-}1})</span> is a cyclic sequence such that each length-<i>n</i> substring appears at most once <i>in either direction</i>. When <span>(k= 2)</span>, efficient algorithms are known to construct binary orientable sequences, with asymptotically optimal length, by applying the classic cycle-joining technique. The key to the construction is the definition of a parent rule to construct a cycle-joining tree of asymmetric bracelets. Unfortunately, the parent rule does not generalize to larger alphabets. Furthermore, unlike the binary case, a cycle-joining tree does not immediately lead to a simple successor-rule when <span>(k ge 3)</span> unless the tree has certain properties. In this paper, we derive a parent rule to derive a cycle-joining tree of <i>k</i>-ary asymmetric bracelets. This leads to a successor rule that constructs asymptotically optimal <i>k</i>-ary orientable sequences in <i>O</i>(<i>n</i>) time per symbol using <i>O</i>(<i>n</i>) space. In the special case when <span>(n=2)</span>, we provide a simple construction of <i>k</i>-ary orientable sequences of maximal length.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"28 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143518771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meet-in-the-middle attack on round-reduced SCARF under single pair-of-tweaks setting
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-27 DOI: 10.1007/s10623-025-01596-x
Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang
{"title":"Meet-in-the-middle attack on round-reduced SCARF under single pair-of-tweaks setting","authors":"Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang","doi":"10.1007/s10623-025-01596-x","DOIUrl":"https://doi.org/10.1007/s10623-025-01596-x","url":null,"abstract":"<p><span>SCARF</span>, an ultra low-latency tweakable block cipher, is the first cipher designed for cache randomization. The block cipher design is significantly different from other common tweakable block ciphers; with a block size of only 10 bits, and yet the input key size is a whopping 240 bits. Notably, the majority of the round key in its round function is absorbed into the data path through AND operations, rather than the typical XOR operations. In this paper, we present a key-recovery attack on a round-reduced version of <span>SCARF</span> with 4 + 4 rounds under the single pair-of-tweaks setting. Our attack is essentially a Meet-in-the-Middle (MitM) attack, where the matching phase is represented by a system of linear equations. Unlike the cryptanalysis conducted by the designers, our attack is effective under both security requirements they have outlined. The data complexity of our attack is <span>(2^{10})</span> plaintexts, with a time complexity of approximately <span>(2^{60.63})</span> 4-round of <span>SCARF</span> encryptions. It is important to note that our attack does not threaten the overall security of <span>SCARF</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"38 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143507255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new family of AMDS symbol-pair constacyclic codes of length $$textbf{4p}$$ and symbol-pair distance $$textbf{9}$$
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-27 DOI: 10.1007/s10623-025-01600-4
Hai Q. Dinh, Hieu V. Ha, Bac T. Nguyen, Thieu N. Vo
{"title":"A new family of AMDS symbol-pair constacyclic codes of length $$textbf{4p}$$ and symbol-pair distance $$textbf{9}$$","authors":"Hai Q. Dinh, Hieu V. Ha, Bac T. Nguyen, Thieu N. Vo","doi":"10.1007/s10623-025-01600-4","DOIUrl":"https://doi.org/10.1007/s10623-025-01600-4","url":null,"abstract":"<p>Let <i>p</i> be any prime number such that <span>(pequiv 1 pmod 4)</span>, and let <span>({mathbb {F}}_p)</span> be the finite field of <i>p</i> elements. In this paper, we first construct a new AMDS symbol-pair cyclic code of length 4<i>p</i> and of symbol-pair distance 9 by examining its generator polynomial. We then use the generator polynomial to obtain a family of <span>((p-1)/2)</span> AMDS symbol-pair constacyclic codes of the same length and of the same symbol-pair distance.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"51 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143506852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing locality in some generalized AG codes
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-24 DOI: 10.1007/s10623-025-01597-w
Bastien Pacifico
{"title":"Introducing locality in some generalized AG codes","authors":"Bastien Pacifico","doi":"10.1007/s10623-025-01597-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01597-w","url":null,"abstract":"<p>In 1999, Xing, Niederreiter and Lam introduced a generalization of AG codes (GAG codes) using the evaluation at non-rational places of a function field. In this paper, we show that one can obtain a locality parameter <i>r</i> in such codes by using only non-rational places of degree at most <i>r</i>. This is, up to the author’s knowledge, a new way to construct locally recoverable codes (LRCs). We give an example of such a code reaching the Singleton-like bound for LRCs, and show the parameters obtained for some longer codes over <span>(mathbb F_3)</span>. We then investigate similarities with some concatenated codes. Contrary to previous methods, our construction allows one to obtain directly codes whose dimension is not a multiple of the locality. Finally, we give an asymptotic study using the Garcia–Stichtenoth tower of function fields, for both our construction with GAG codes and a construction of concatenated codes. We give explicit infinite families of LRCs with locality 2 over any finite field of cardinality greater than 3 following our approach with GAG codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"24 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143485891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bounds and constructions of optimal symbol-pair codes with constant pair-weight
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-22 DOI: 10.1007/s10623-025-01598-9
Mengzhen Zhao, Yanxun Chang
{"title":"Bounds and constructions of optimal symbol-pair codes with constant pair-weight","authors":"Mengzhen Zhao, Yanxun Chang","doi":"10.1007/s10623-025-01598-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01598-9","url":null,"abstract":"<p>Symbol-pair codes introduced by Cassuto and Blaum in 2010 are designed to protect against pair errors in symbol-pair read channels. This special channel structure is motivated by the limitations of the reading process in high density data storage systems, where it is no longer possible to read individual symbols. In this work, we study bounds and constructions of codes in symbol-pair metric. By using some combinatorial structures, we give constructions of optimal <i>q</i>-ary symbol-pair codes with constant pair-weight <span>(w_p)</span> and pair-distance <span>(2w_p-1)</span> for some length <i>n</i>, and some optimal <i>q</i>-ary codes with pair-weight <span>(w_p=3,4)</span> for all pair-distance between 3 and <span>(2w_p-1)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"28 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143470740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal two-dimensional multilength optical orthogonal codes via compatible mixed difference packing set systems
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-18 DOI: 10.1007/s10623-025-01587-y
Hengming Zhao, Rongcun Qin, Minquan Cheng, Dianhua Wu
{"title":"Optimal two-dimensional multilength optical orthogonal codes via compatible mixed difference packing set systems","authors":"Hengming Zhao, Rongcun Qin, Minquan Cheng, Dianhua Wu","doi":"10.1007/s10623-025-01587-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01587-y","url":null,"abstract":"<p>Two-dimensional multilength optical orthogonal codes (2D MLOOCs) were proposed as a means of simultaneously reducing the chip rate and accommodating multimedia services with multiple bit rates and quality of service (QoS) requirements in OCDMA networks. This paper considers two-dimensional multilength optical orthogonal codes with inter-cross-correlation of <span>(lambda =2)</span>. New upper bounds on the size of 2D MLOOCs are presented under certain constraints. In order to construct optimal 2D MLOOCs, a compatible mixed difference packing (CMDP) set system is introduced. By using both direct constructions and recursive constructions, several series of 2D MLOOCs are obtained which are optimal with respect to the new upper bounds.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"24 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143435691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A note on the Walsh spectrum of the Flystel
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-15 DOI: 10.1007/s10623-025-01589-w
Matthias Johann Steiner
{"title":"A note on the Walsh spectrum of the Flystel","authors":"Matthias Johann Steiner","doi":"10.1007/s10623-025-01589-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01589-w","url":null,"abstract":"<p><span>Anemoi</span> is a family of compression and hash functions over finite fields <span>(mathbb {F}_q)</span> for efficient Zero-Knowledge applications. Its round function is based on a novel permutation <span>(mathcal {H}: mathbb {F}_q^2 rightarrow mathbb {F}_q^2)</span>, called the open <span>Flystel</span>, which is parametrized by a permutation <span>(E: mathbb {F}_q rightarrow mathbb {F}_q)</span> and two functions <span>(Q_gamma , Q_delta : mathbb {F}_q rightarrow mathbb {F}_q)</span>. Over a prime field <span>(mathbb {F}_p)</span> with <i>E</i> a power permutation and <span>(Q_gamma )</span>, <span>(Q_delta )</span> quadratic functions with identical leading coefficient, the <span>Anemoi</span> designers conjectured for the absolute value of the Walsh transform that <span>(max _{textbf{a} in mathbb {F}_p^2, textbf{b} in mathbb {F}_p^2 {setminus } { textbf{0} }} left| mathcal {W}_mathcal {H} (psi , textbf{a}, textbf{b}) right| le p cdot log left( p right) )</span>. By exploiting that the open <span>Flystel</span> is CCZ-equivalent to the closed <span>Flystel</span>, we prove in this note that <span>(max _{textbf{a} in mathbb {F}_p^2, textbf{b} in mathbb {F}_p^2 {setminus } { textbf{0} }} left| mathcal {W}_mathcal {H} (psi , textbf{a}, textbf{b}) right| le (d - 1) cdot p)</span>, where <span>(d = deg left( E right) )</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"13 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143418515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信