On the soundness of algebraic attacks against code-based assumptions
Cueto Noval M, Merz S-P, Stählin P, Ünal A. 2025. On the soundness of algebraic attacks against code-based assumptions. 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. EUROCRYPT: International Conference on the Theory and Applications of Cryptographic Techniques, LNCS, vol. 15606, 385–415.
Download (ext.)
Conference Paper
| Published
| English
Scopus indexed
Author
Corresponding author has ISTA affiliation
Department
Series Title
LNCS
Abstract
We study recent algebraic attacks (Briaud-Øygarden EC’23) on the Regular Syndrome Decoding (RSD) problem and the assumptions underlying the correctness of their attacks’ complexity estimates. By relating these assumptions to interesting algebraic-combinatorial problems, we prove that they do not hold in full generality. However, we show that they are (asymptotically) true for most parameter sets, supporting the soundness of algebraic attacks on RSD. Further, we prove—without any heuristics or assumptions—that RSD can be broken in polynomial time whenever the number of error blocks times the square of the size of error blocks is larger than 2 times the square of the dimension of the code.
Additionally, we use our methodology to attack a variant of the Learning With Errors problem where each error term lies in a fixed set of constant size. We prove that this problem can be broken in polynomial time, given a sufficient number of samples. This result improves on the seminal work by Arora and Ge (ICALP’11), as the attack’s time complexity is independent of the LWE modulus.
Publishing Year
Date Published
2025-04-28
Proceedings Title
44th Annual International Conference on the Theory and Applications of Cryptographic Techniques
Publisher
Springer Nature
Acknowledgement
We thank Pierre Briaud and Morten Øygarden for helpful discussions on algebraic attacks on RSD, and the EC reviewers for helpful comments.
Volume
15606
Page
385-415
Conference
EUROCRYPT: International Conference on the Theory and Applications of Cryptographic Techniques
Conference Location
Madrid, Spain
Conference Date
2025-05-04 – 2025-05-08
ISBN
ISSN
eISSN
IST-REx-ID
Cite this
Cueto Noval M, Merz S-P, Stählin P, Ünal A. On the soundness of algebraic attacks against code-based assumptions. In: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Vol 15606. Springer Nature; 2025:385-415. doi:10.1007/978-3-031-91095-1_14
Cueto Noval, M., Merz, S.-P., Stählin, P., & Ünal, A. (2025). On the soundness of algebraic attacks against code-based assumptions. In 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Vol. 15606, pp. 385–415). Madrid, Spain: Springer Nature. https://doi.org/10.1007/978-3-031-91095-1_14
Cueto Noval, Miguel, Simon-Philipp Merz, Patrick Stählin, and Akin Ünal. “On the Soundness of Algebraic Attacks against Code-Based Assumptions.” In 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 15606:385–415. Springer Nature, 2025. https://doi.org/10.1007/978-3-031-91095-1_14.
M. Cueto Noval, S.-P. Merz, P. Stählin, and A. Ünal, “On the soundness of algebraic attacks against code-based assumptions,” in 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, 2025, vol. 15606, pp. 385–415.
Cueto Noval M, Merz S-P, Stählin P, Ünal A. 2025. On the soundness of algebraic attacks against code-based assumptions. 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. EUROCRYPT: International Conference on the Theory and Applications of Cryptographic Techniques, LNCS, vol. 15606, 385–415.
Cueto Noval, Miguel, et al. “On the Soundness of Algebraic Attacks against Code-Based Assumptions.” 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 15606, Springer Nature, 2025, pp. 385–415, doi:10.1007/978-3-031-91095-1_14.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Link(s) to Main File(s)
Access Level
