Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems

被引:2
|
作者
Santini, Paolo [1 ]
Baldi, Marco [1 ]
Chiaraluce, Franco [1 ]
机构
[1] Polytech Univ Marche, Dept Informat Engn, TR-60131 Ancona, Italy
关键词
Code-based cryptography; permuted kernel problem; small support subcodes; subcode equivalence problem;
D O I
10.1109/TIT.2023.3323068
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Permuted Kernel Problem (PKP) asks to find a permutation which maps an input matrix into the kernel of some given vector space. The literature exhibits several works studying its hardness in the case of the input matrix being mono-dimensional (i.e., a vector), while the multi-dimensional case has received much less attention and, de facto, only the case of a binary ambient finite field has been studied. The Subcode Equivalence Problem (SEP), instead, asks to find a permutation so that a given linear code becomes a subcode of another given code. At the best of our knowledge, no algorithm to solve the SEP has ever been proposed. In this paper we study the computational hardness of solving these problems. We first show that, despite going by different names, PKP and SEP are exactly the same problem. Then we consider the state-of-the-art solver for the mono-dimensional PKP (namely, the KMP algorithm, proposed by Koussa, Macario-Rat and Patarin), generalize it to the multi-dimensional case and analyze both the finite and the asymptotic regimes. We further propose a new algorithm, which can be thought of as a refinement of KMP. In the asymptotic regime our algorithm does not improve on KMP but, in the finite regime (and for parameters of practical interest), we achieve significant improvements, especially for the multi-dimensional version of PKP. As an evidence, we show that it is the fastest algorithm to attack several recommended instances of cryptosystems based on PKP. As a side-effect, given the mentioned equivalence between PKP and SEP, all the algorithms we analyze in this paper can be used to solve instances of the latter problem.
引用
收藏
页码:2254 / 2270
页数:17
相关论文
共 50 条
  • [1] ON THE COMPUTATIONAL HARDNESS OF THE CODE EQUIVALENCE PROBLEM IN CRYPTOGRAPHY
    Barenghi, Alessandro
    Biasse, Jean-Francois
    Persichetti, Edoardo
    Santini, Paolo
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2023, 17 (01) : 23 - 55
  • [2] Permuted Puzzles and Cryptographic Hardness
    Boyle, Elette
    Holmgren, Justin
    Weiss, Mor
    THEORY OF CRYPTOGRAPHY, TCC 2019, PT II, 2019, 11892 : 465 - 493
  • [3] Cryptanalysis of the Binary Permuted Kernel Problem
    Paiva, Thales Bandiera
    Terada, Routo
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II, 2021, 12727 : 396 - 423
  • [4] The computational complexity of equivalence and isomorphism problems - Introduction
    Goos, G
    COMPUTATIONAL COMPLEXITY OF EQUIVALENCE AND ISOMORPHISM PROBLEMS, 2000, 1852 : 1 - 10
  • [5] On the number of solutions to a random instance of the permuted kernel problem
    Sanna, Carlo
    JOURNAL OF COMPLEXITY, 2025, 86
  • [7] Revisiting the definition of local hardness and hardness kernel
    Polanco-Ramirez, Carlos A.
    Franco-Perez, Marco
    Carmona-Espindola, Javier
    Gazquez, Jose L.
    Ayers, Paul W.
    PHYSICAL CHEMISTRY CHEMICAL PHYSICS, 2017, 19 (19) : 12355 - 12364
  • [9] Computational Equivalence Between the Problems of Sorting and Monotone Reconstruction for Random Permutations
    Kequan Ding(Department of Mathematics
    数学研究与评论, 1991, (01) : 1 - 8
  • [10] Simplified models for hardness kernel and calculations of global hardness
    Liu, SB
    DeProft, F
    Parr, RG
    JOURNAL OF PHYSICAL CHEMISTRY A, 1997, 101 (37): : 6991 - 6997