Sommaire

  • Cet exposé a été présenté le 10 décembre 2021.

Description

  • Orateur

    Ba Duc Pham - Rennes

In 2005, Faure and Loidreau proposed a new rank-metric cryptosystem inspired from the Hamming metric scheme of Augot-Finiasz in 2003. In 2018, it was broken by the attack of Gaborit, Otmani and Kalachi. Recently, there are some attempts of repairing the Faure-Loidreau scheme, for example the work of Renner, Puchinger and Wachter–Zeh which is called LIGA. In this thesis, we also introduce a new cryptosystem so-called RAMESSES which is another repairing of Faure-Loidreau scheme.<br/> Besides, we also study about the recent attack of Coggia and Couveur in the Loidreau's cryptosystem (2017). Although they only propose an idea for a special case of the dimension of secret subspace, this attack can be generalized. In this thesis, we propose an analysis of Coggia-Couvreur attack on Loidreau’s rank-metric public-key encryption scheme in the general case. The last part is a study about the decoding of the sum of Gabidulin codes which is inspired from the work of Loidreau in 2005 "Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes". This work is also an attempt to repair the Loidreau's cryptosystem (2017) to avoid the Coggia-Couveur's attack.<br/> lien:

Prochains exposés

  • Journées C2: pas de séminaire

    • 03 avril 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

  • Endomorphisms via Splittings

    • 10 avril 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Min-Yi Shen - No Affiliation

    One of the fundamental hardness assumptions underlying isogeny-based cryptography is the problem of finding a non-trivial endomorphism of a given supersingular elliptic curve. In this talk, we show that the problem is related to the problem of finding a splitting of a principally polarised superspecial abelian surface. In particular, we provide formal security reductions and a proof-of-concept[…]
    • Cryptography

Voir les exposés passés