Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

"maximum distance" of a Goppa code?

13 views
Skip to first unread message

Wei Dai

unread,
Dec 15, 2006, 8:50:45 PM12/15/06
to
I'm looking at the McEliece-based short signature scheme proposed in 2001 by
Courtois, Finiasz, and Sendrier (http://eprint.iacr.org/2001/010), and
noticed that while the signatures are short on average, the length (as well
as the signing time) is unbounded in the worst case. When signing with this
scheme, you have to repeatedly hash the message along with a counter until
the hash is a decodable syndrome (of a Goppa code), and send the counter
along with the signature that is eventually produced. If you are unlucky the
counter could be arbitrarily large. This makes the scheme incompatible with
applications that need a fixed length (or at least bounded length)
signature.

The authors mention early in the paper that an alternative to repeated
hashing is to try to decode "undecodable" syndromes essentially by brute
force exploring of its neighborhood in code space. That is, repeatedly
adding some number of random columns of the parity check matrix until one
obtains a decodable syndrome. For some unknown reason the authors give up
this approach, but it seems to me that this is just as efficient as the
repeated hashing approach, and if we explore the neighborhood of the
syndrome systematically instead of randomly, we would get a signature scheme
whose signature length and signing time are bounded by a function of the
maximum distance of the Goppa code.

Actually, I'm not sure "maximum distance" is the right terminology, but you
probably know what I mean: distance to the closest codeword in the worst
case. My question is, how can we compute this distance for a Goppa code?


DmitryKovtun

unread,
Dec 15, 2006, 10:53:05 PM12/15/06
to

"Wei Dai" <use...@weidai.com> wrote in message
news:elvlcl$dcc$1...@news.mc.ntu.edu.tw...

here is a weight distribution has min and max distances in it;
not Goppa

http://magma.maths.usyd.edu.au/magma/Examples/node114.html


daniel bleichenbacher

unread,
Dec 16, 2006, 5:09:14 PM12/16/06
to

Wei Dai wrote:
> I'm looking at the McEliece-based short signature scheme proposed in 2001 by
> Courtois, Finiasz, and Sendrier (http://eprint.iacr.org/2001/010), and
> noticed that while the signatures are short on average, the length (as well
> as the signing time) is unbounded in the worst case. When signing with this
> scheme, you have to repeatedly hash the message along with a counter until
> the hash is a decodable syndrome (of a Goppa code), and send the counter
> along with the signature that is eventually produced. If you are unlucky the
> counter could be arbitrarily large. This makes the scheme incompatible with
> applications that need a fixed length (or at least bounded length)
> signature.
>

Is this scheme still unbroken? I find the arguments by the authors
rather unconvincing.
If nothing has been published so far, I'll go over my notes and check
if something
substantial can be found.

Daniel Bleichenbacher

Wei Dai

unread,
Dec 16, 2006, 7:46:16 PM12/16/06
to
"daniel bleichenbacher" <daniel_ble...@yahoo.com> wrote in message
news:1166306953.9...@l12g2000cwl.googlegroups.com...

> Is this scheme still unbroken? I find the arguments by the authors
> rather unconvincing.
> If nothing has been published so far, I'll go over my notes and check
> if something
> substantial can be found.

It's still unbroken, at least according to this recent review:

http://eprint.iacr.org/2006/162
A Summary of McEliece-Type Cryptosystems and their Security
D. Engelbert, R. Overbeck and A. Schmidt

I also didn't find any attacks using a search of Google Scholar.

And to partially answer my own question, apparently the correct terminology
for what I'm looking for is "covering radius". I'm now searching the
literature with the right term...


daniel bleichenbacher

unread,
Dec 17, 2006, 5:11:53 AM12/17/06
to

Wei Dai wrote:
> "daniel bleichenbacher" <daniel_ble...@yahoo.com> wrote in message
> news:1166306953.9...@l12g2000cwl.googlegroups.com...
> > Is this scheme still unbroken? I find the arguments by the authors
> > rather unconvincing.
> > If nothing has been published so far, I'll go over my notes and check
> > if something
> > substantial can be found.
>
> It's still unbroken, at least according to this recent review:
>
> http://eprint.iacr.org/2006/162
> A Summary of McEliece-Type Cryptosystems and their Security
> D. Engelbert, R. Overbeck and A. Schmidt
>
> I also didn't find any attacks using a search of Google Scholar.

Ok, I think I have a simple attack that requires about 2^57 hash
computations.
I don't have much time to check this again right now. If you are
interested I could send
you my notes.

Wei Dai

unread,
Dec 19, 2006, 1:34:26 AM12/19/06
to
"daniel bleichenbacher" <daniel_ble...@yahoo.com> wrote in message
news:1166350313....@80g2000cwy.googlegroups.com...

> Ok, I think I have a simple attack that requires about 2^57 hash
> computations.
> I don't have much time to check this again right now. If you are
> interested I could send
> you my notes.

Please do, I'm certainly interested.

I sent a private request but did not get a response. If you already sent the
notes, it probably got lost due to spam filters. Can you please try again
using this web form here: http://ibiblio.org/weidai/mailme.php, or just post
your notes in this newsgroup. Email has become so unreliable now, sigh...


use...@weidai.com

unread,
Jan 12, 2007, 2:58:56 PM1/12/07
to
In case anyone is curious about Daniel Bleichenbacher's attack, I did
receive the manuscript from him, and the attack described seems like it

should work. It takes about 2^45 memory and 2^57 hash computations to
forge
a signature. Unfortunately he also said he's not planning to publish
the
paper due to certain reasons.

And to answer my own question that started off this thread, I found a
paper
[1] that shows the covering radius of a Goppa code to be bounded by
2t+1
which is the same as its minimum distance. So a variant of the CFS
signature
scheme that uses systematic search instead of rehashing (as I suggested
in
the opening post) would still have a maximum signature length that is
approximately twice its average signature length (and a maximum signing
time
that is exponential in the average signature length).

The existence of Bleichenbacher's attack and the lack of a better bound
on
its maximum signature length makes the CFS signature scheme rather less

attractive than it appeared initially. The construction of an n-bit
signature scheme with close to n-bit security still seems to be an open

problem.

[1] Françoise Levy-dit-Vehel and Simon Litsyn, "Parameters of Goppa
codes
revisited" http://www.ensta.fr/~levy/goppaweb.ps

"daniel bleichenbacher" <daniel_ble...@yahoo.com> wrote in
message

news:1166350313....@80g2000cwy.googlegroups.com...

fin...@gmail.com

unread,
Jan 15, 2007, 7:41:31 AM1/15/07
to
I just saw your discussion and I would really be interested in seeing
this attack. I wasn't aware of any attack one our signature scheme and
would be glad to see one!

0 new messages