Cybernetics and Systems Analysis, Vol. 41, No. 3, 2005
ASYMMETRIC CODE-THEORETICAL SCHEMES
CONSTRUCTED WITH THE USE OF ALGEBRAIC
GEOMETRIC CODES
Yu. V. Stasev and A. A. Kuznetsov
†
UDC 621.391
Asymmetric coding schemes are developed that are constructed with the use of algebraic geometric
codes. Basic analytical expressions are obtained that connect the parameters of algebraic geometric
codes with the parameters of asymmetric coding schemes based on these codes.
Keywords: algebraic geometric codes, asymmetric coding, coding schemes.
INTRODUCTION
The use of asymmetric cryptosystems that do not need the organization of a secure communication channel for
transmission of key information is considered to be a promising direction of modern cryptography. Code-theoretical schemes
based on algebraic codes [1–4] occupy a particular place among asymmetric cryptosystems. They have an essential merit,
namely, a high rate of cryptographic transformation of information. However, as is shown in [3, 4], well-known schemes
based on generalized Reed–Solomon codes can be broken by algorithms of polynomial complexity. A promising direction in
developing code-theoretical schemes is considered to be the use of algebraic geometric codes. The objective of this article is
the development of asymmetric code-theoretical schemes with the use of algebraic geometric codes and derivation of basic
analytical expressions that connect the parameters of algebraic geometric codes with the parameters of asymmetric coding
schemes constructed on their basis.
ASYMMETRIC CODE-THEORETICAL SCHEMES
BASED ON ALGEBRAIC CODES
Code-theoretical schemes for cryptographic data protection were first proposed in [1, 2]. In these schemes, the
stubborn problem of decoding a random code (a generally positioned code) is used for the realization of a one-sided
cryptographic function. In fact, the decoding of any linear code (general position code) is a very complicated computational
problem and the complexity of its solution increases exponentially [5]. For example, for correlation decoding of an arbitrary
(, , ) nkd code over GF q ( ), it is necessary, in the general case, to compare an arrived sequence with all q
k
code words and to
select the closest word (in the Hamming metric). Even for small nkd , , , and q, the problem of correlation decoding is rather
labor-consuming. This principle underlies all the cryptosystems based on code-theoretical schemes. Masking a code with a
fast decoding algorithm (of polynomial complexity) under an appearance of an arbitrary (random) block code, one can
represent the decoding problem for an outside observer (a probable violator) as a computationally complicated problem (of
exponential complexity). For an authorized user of a cryptosystem (who has the secret key), decoding is a polynomially
solvable problem.
Let G be the generating matrix of a linear ( , , ) nkd code over GF q ( ) with polynomial complexity of decoding. Let X
be a nonsingular k k ´ matrix over GF q ( ), let D be a diagonal matrix with nonzero elements on its diagonal, and let P be a
354
1060-0396/05/4103-0354
©
2005 Springer Science+Business Media, Inc.
Kharkov University of Air Forces, Kharkov, Ukraine,
†
kuznetsov_alex@rambler.ru. Translated from Kibernetika i
Sistemnyi Analiz, No. 3, pp. 47-57, May-June 2005. Original article submitted November 15, 2004.