{"title":"Quantum sieving for code-based cryptanalysis and its limitations for ISD","authors":"Lynn Engelberts, Simona Etinski, Johanna Loyer","doi":"10.1007/s10623-024-01545-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01545-0","url":null,"abstract":"<p>Sieving using near-neighbor search techniques is a well-known method in lattice-based cryptanalysis, yielding the current best runtime for the shortest vector problem in both the classical and quantum setting. Recently, sieving has also become an important tool in code-based cryptanalysis. Specifically, a variant of the information-set decoding (ISD) framework, commonly used for attacking cryptographically relevant instances of the decoding problem, has been introduced that involves a sieving subroutine. The resulting sieving-based ISD framework yields complexities close to the best-performing classical algorithms for the decoding problem. It is therefore natural to ask how well quantum versions perform. In this work, we introduce the first quantum algorithms for code sieving by designing quantum variants of the aforementioned sieving subroutine. In particular, using quantum-walk techniques, we provide a speed-up over classical code sieving and over a variant using Grover’s algorithm. Our quantum-walk algorithm exploits the structure of the underlying search problem by adding a layer of locality sensitive filtering, inspired by a quantum-walk algorithm for lattice sieving. We complement our asymptotic analysis of the quantum algorithms with numerical results, and observe that our quantum speed-ups for code sieving behave similarly as those observed in lattice sieving. In addition, we show that a natural quantum analog of the sieving-based ISD framework does not provide any speed-up over the first quantum ISD algorithm. Our analysis highlights that the framework should be adapted in order to outperform state-of-the-art quantum ISD algorithms.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142916896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bart De Bruyn, Sergey Goryainov, Willem H. Haemers, Leonid Shalaginov
{"title":"Divisible design graphs from the symplectic graph","authors":"Bart De Bruyn, Sergey Goryainov, Willem H. Haemers, Leonid Shalaginov","doi":"10.1007/s10623-024-01557-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01557-w","url":null,"abstract":"<p>A divisible design graph is a graph whose adjacency matrix is an incidence matrix of a (group) divisible design. Divisible design graphs were introduced in 2011 as a generalization of <span>((v,k,lambda ))</span>-graphs. Here we describe four new infinite families that can be obtained from the symplectic strongly regular graph <i>Sp</i>(2<i>e</i>, <i>q</i>) (<i>q</i> odd, <span>(ege 2)</span>) by modifying the set of edges. To achieve this we need two kinds of spreads in <span>(PG(2e-1,q))</span> with respect to the associated symplectic form: the symplectic spread consisting of totally isotropic subspaces and, when <span>(e=2)</span>, a special spread that consists of lines which are not totally isotropic and which is closed under the action of the associated symplectic polarity. Existence of symplectic spreads is known, but the construction of a special spread for every odd prime power <i>q</i> is a main result of this paper. We also show an equivalence between special spreads of <i>Sp</i>(4, <i>q</i>) and certain nice point sets in the projective space <span>(operatorname {PG}(4,q))</span>. We have included relevant background from finite geometry, and when <span>(q=3,5)</span> and 7 we worked out all possible special spreads.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Several families of negacyclic BCH codes and their duals","authors":"Zhonghua Sun, Xinyue Liu","doi":"10.1007/s10623-024-01551-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01551-2","url":null,"abstract":"<p>Negacyclic BCH codes are a special subclasses of negacyclic codes, and have the best parameters known in many cases. A family of good negacyclic BCH codes are the <i>q</i>-ary narrow-sense negacyclic BCH codes of length <span>(n=(q^m-1)/2)</span>, where <i>q</i> is an odd prime power. Little is known about the true minimum distance of this family of negacyclic BCH codes and the dimension of this family of negacyclic BCH codes with large designed distance. The main objective of this paper is to study three subfamilies of this family of negacyclic BCH codes. The dimension and true minimum distance of a subfamily of the <i>q</i>-ary narrow-sense negacyclic BCH codes of length <i>n</i> are determined. The dimension and good lower bounds on the minimum distance of two subfamilies of the <i>q</i>-ary narrow-sense negacyclic BCH codes of length <i>n</i> are presented. The minimum distances of the duals of the <i>q</i>-ary narrow-sense negacyclic BCH codes of length <i>n</i> are also investigated. As will be seen, the three subfamilies of negacyclic BCH codes are sometimes distance-optimal and sometimes have the same parameters as the best linear codes known.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault attacks on multi-prime RSA signatures","authors":"Chunzhi Zhao, Jinzheng Cao, Junqi Zhang, Qingfeng Cheng","doi":"10.1007/s10623-024-01554-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01554-z","url":null,"abstract":"<p>At CHES 2009, Coron et al. proposed a fault attack on standard RSA signatures based on Coppersmith’s method. This work greatly enhances the practicality of fault attacks on RSA signatures. In practice, multi-prime RSA signatures are widely used due to their faster generation speed. In this paper, we propose fault attacks on multi-prime RSA signatures under the PKCS#1 v2.x protocols. We conduct the fault attacks based on Coppersmith’s method in various scenarios. To be specific, we first consider the case where there is only one fault signature, and then we consider the cases where there are multiple fault signatures with co-prime moduli, common moduli, and arbitrary moduli. For each case, we give the upper bound of the unknowns that can be solved in polynomial time, which improves the practicability of the attacks. Our research is grounded in the EMSA-PKCS1-v1_5 encoding method and has been verified by experiments.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"33 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The support designs of several families of lifted linear codes","authors":"Cunsheng Ding, Zhonghua Sun, Qianqian Yan","doi":"10.1007/s10623-024-01549-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01549-w","url":null,"abstract":"<p>A generator matrix of a linear code <span>({mathcal {C}})</span> over <span>({textrm{GF}}(q))</span> is also a matrix of the same rank <i>k</i> over any extension field <span>({textrm{GF}}(q^ell ))</span> and generates a linear code of the same length, same dimension and same minimum distance over <span>({textrm{GF}}(q^ell ))</span>, denoted by <span>({mathcal {C}}(q|q^ell ))</span> and called a lifted code of <span>({mathcal {C}})</span>. Although <span>({mathcal {C}})</span> and their lifted codes <span>({mathcal {C}}(q|q^ell ))</span> have the same parameters, they have different weight distributions and different applications. Few results about lifted linear codes are known in the literature. This paper proves some fundamental theory for lifted linear codes, and studies the 2-designs of the lifted projective Reed–Muller codes, lifted Hamming codes and lifted Simplex codes. In addition, this paper settles the weight distributions of the lifted Reed–Muller codes of certain orders, and investigates the 3-designs supported by these lifted codes. As a by-product, an infinite family of three-weight projective codes over <span>({textrm{GF}}(4))</span> is obtained.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142884413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-weight codewords in cyclic codes","authors":"J. G. Coelho, F. E. Brochero Martínez","doi":"10.1007/s10623-024-01547-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01547-y","url":null,"abstract":"<p>We introduce a formula for determining the number of codewords of weight 2 in cyclic codes and provide results related to the count of codewords with weight 3. Additionally, we establish a recursive relationship for binary cyclic codes that connects their weight distribution to the number of solutions of associated systems of polynomial equations. This relationship allows for the computation of weight distributions from known solutions of systems of diagonal equations and vice versa, offering a new insight into the structure and properties of binary cyclic codes.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"123 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142884410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guessing less and better: improved attacks on GIFT-64","authors":"Federico Canale, María Naya-Plasencia","doi":"10.1007/s10623-024-01527-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01527-2","url":null,"abstract":"<p>GIFT-64 is a block cipher that has received a lot of attention from the community since its proposal in 2017. The attack on the highest number of rounds is a differential related-key attack on 26 rounds. We studied this attack, in particular with respect to some recent generic frameworks for improving key recovery, and we realised that this framework, combined with an efficient parallel key guessing of interesting subsets of the key and a consequent list merging applied to the partial solutions, can improve the complexity of the attack. We propose two different trade-offs, as a result of the improved key-recovery. We believe that the techniques are quite generic and that it is possible to apply them to improve other differential attacks.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On automorphism groups of binary cyclic codes","authors":"Jicheng Ma, Guiying Yan","doi":"10.1007/s10623-024-01539-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01539-y","url":null,"abstract":"<p>Cyclic codes, as a significant subclass of linear codes, can be constructed and analyzed using algebraic methods. Due to its cyclic nature, they have efficient encoding and decoding algorithms. To date, cyclic codes have found applications in various domains, including consumer electronics, data storage systems, and communication systems. In this paper, we investigate the full automorphism groups of binary cyclic codes. A matrix presentation technique of cyclic codewords is introduced, which subsequently serves well for presenting binary cyclic codes of long lengths. These constructions are significantly useful in facilitating the determination of the full automorphism groups of binary cyclic codes of specified lengths.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Several new classes of optimal ternary cyclic codes with two or three zeros","authors":"Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang","doi":"10.1007/s10623-024-01541-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01541-4","url":null,"abstract":"<p>Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let <span>(alpha )</span> be a generator of <span>(mathbb F_{3^m}setminus {0})</span>, where <i>m</i> is a positive integer. Denote by <span>(mathcal {C}_{(i_1,i_2,cdots , i_t)})</span> the cyclic code with generator polynomial <span>(m_{alpha ^{i_1}}(x)m_{alpha ^{i_2}}(x)cdots m_{alpha ^{i_t}}(x))</span>, where <span>({{m}_{alpha ^{i}}}(x))</span> is the minimal polynomial of <span>({{alpha }^{i}})</span> over <span>({{mathbb {F}}_{3}})</span>. In this paper, by analyzing the solutions of certain equations over finite fields, we present four classes of optimal ternary cyclic codes <span>(mathcal {C}_{(0,1,e)})</span> and <span>(mathcal {C}_{(1,e,s)})</span> with parameters <span>([3^m-1,3^m-frac{3m}{2}-2,4])</span>, where <span>(s=frac{3^m-1}{2})</span>. In addition, by determining the solutions of certain equations and analyzing the irreducible factors of certain polynomials over <span>(mathbb F_{3^m})</span>, we present four classes of optimal ternary cyclic codes <span>(mathcal {C}_{(2,e)})</span> and <span>(mathcal {C}_{(1,e)})</span> with parameters <span>([3^m-1,3^m-2m-1,4])</span>. We show that our new optimal cyclic codes are not covered by known ones.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"24 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal combinatorial neural codes via symmetric designs","authors":"Xingyu Zheng, Shukai Wang, Cuiling Fan","doi":"10.1007/s10623-024-01534-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01534-3","url":null,"abstract":"<p>Combinatorial neural (CN) codes are binary codes introduced firstly by Curto et al. for asymmetric channel, and then are further studied by Cotardo and Ravagnani under the metric <span>(delta _r)</span> (called asymmetric discrepancy) which measures the differentiation of codewords in CN codes. When <span>(r>1)</span>, CN codes are different from the usual error-correcting codes in symmetric channel (<span>(r=1)</span>). In this paper, we focus on the optimality of some CN codes with <span>(r>1)</span>. An upper bound for the size of CN codes with <span>(delta _r=r+1)</span> is deduced, by discussing the relationship between such CN codes and error-detecting codes for asymmetric channels, which is shown to be tight in this case. We also propose an improved Plotkin bound for CN codes. Notably, by applying symmetric designs related with Hadamard matrices, we not only generalize one former construction of optimal CN codes by bent functions obtained by Zhang et al. (IEEE Trans Inf Theory 69:5440–5448, 2023), but also obtain seven classes of new optimal CN codes meeting the improved Plotkin bound.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142841501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}