Next Article in Journal
Delay-Dependent and Order-Dependent Guaranteed Cost Control for Uncertain Fractional-Order Delayed Linear Systems
Previous Article in Journal
A Mathematical Model for the Optimization of Renewable Energy Systems
Previous Article in Special Issue
Consistent Flag Codes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Twisted Hermitian Codes

1
Department of Mathematical Sciences, Carnegie Mellon University, Pittsburgh, PA 15213, USA
2
Department of Computer Science, Stanford University, Stanford, CA 94305, USA
3
Department of Mathematics and Statistics, Vassar College, Poughkeepsie, NY 12604, USA
4
Department of Mathematics, Virginia Polytechnic Institute & State University (Virginia Tech), Blacksburg, VA 24061, USA
5
Department of Mathematics, Liberty University, Lynchburg, VA 24515, USA
6
Department of Mathematics, Oglethorpe University, Atlanta, GA 30319, USA
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(1), 40; https://doi.org/10.3390/math9010040
Submission received: 9 November 2020 / Revised: 21 December 2020 / Accepted: 22 December 2020 / Published: 26 December 2020
(This article belongs to the Special Issue Algebra and Its Applications)

Abstract

:
We define a family of codes called twisted Hermitian codes, which are based on Hermitian codes and inspired by the twisted Reed–Solomon codes described by Beelen, Puchinger, and Nielsen. We demonstrate that these new codes can have high-dimensional Schur squares, and we identify a subfamily of twisted Hermitian codes that achieves a Schur square dimension close to that of a random linear code. Twisted Hermitian codes allow one to work over smaller alphabets than those based on Reed–Solomon codes of similar lengths.

1. Introduction

Reed–Solomon and Hermitian codes are algebraic geometry codes based on the projective line and the Hermitian curve, respectively. To define an algebraic geometry code, let X be a smooth, projective, absolutely irreducible curve over a finite field F . Let G and D : = P 1 + + P n be divisors on X such that P 1 , , P n are distinct F -rational points and the support of G does not contain any of the P i . An algebraic geometric code is of the form
C ( D , G ) = f ( P 1 ) , f ( P 2 ) , , f ( P n ) : f L ( G ) F n
where L ( G ) = f : ( f ) G 0 and ( f ) denotes the divisior of the rational function f on X. In this paper, we will modify this construction for Hermitian codes to yield a new family of codes, called twisted Hermitian codes, with the goal of producing codes which have large Schur squares. Given a finite field F and a positive integer n, the Schur product of vectors x = ( x 1 , , x n ) , y = ( y 1 , , y n ) F n is
x y x 1 y 1 , , x n y n F n .
The Schur product of two linear codes C 1 , C 2 F n is
C 1 C 2 c 1 c 2 c 1 C 1 , c 2 C 2 ,
meaning C 1 C 2 is the set of all linear combinations of vectors of the form c 1 c 2 with coefficients in F and c 1 C 1 , c 2 C 2 . The Schur square of a linear code C is C 2 C C . Schur products were originally used to define error-locating pairs [1] and now arise in several applications, such as secret sharing [2] and code-based cryptography [3]. A challenge in coding theory is to specify explicit codes with high-dimensional Schur squares.
When either a Reed–Solomon code or a Hermitian code is squared, the result is typically a code of the same type which limits its dimension. To obtain a code of the same dimension whose square is much larger, twisted Reed–Solomon codes were defined by Beelen, Puchinger, and Nielsen [4], drawing upon ideas from the twisted Gabidulin codes of Sheekey [5]. These same ideas serve as inspiration for the recent work [6]. In this paper, we introduce twisted Hermitian codes which have an advantage over twisted Reed–Solomon codes in that codes of similar lengths can be obtained over smaller alphabets. Utilizing smaller alphabets can reduce the computational complexity of the finite field arithmetic. For instance, to obtain a (twisted) Reed–Solomon code of length 4096, one must use an alphabet of size 4096 whereas a (twisted) Hermitian code of the same length only requires an alphabet size of 256; hence, one can work over the field with 256 elements rather than the field of cardinality 4096. Twisted Hermitian codes can have a large Schur square, as demonstrated herein, by making use of field extensions.
The motivation is to explicitly construct codes whose behavior, loosely speaking, mimics that of random codes. While this is interesting in its own right, it is also prompted by the McEliece cryptosystem, which is a code-based cryptosystem introduced by McEliece in 1978 [7]. The public key in the McEliece cryptosystem is an obfuscation of the underlying linear code (chosen by McEliece to be a binary Goppa code), disguised to appear as a random code, meaning one lacking any recognizable structure. The security of the McEliece cryptosystem is derived from the NP-hardness of decoding a random linear code, proven by Berlekamp, McEliece, and Tilborg in 1978 [8]. Though the McEliece cryptosystem remains unbroken to this day (even with quantum algorithms), its reliance on binary Goppa codes results in large key sizes that hinder practical implementation. As a result, many variants of the McEliece cryptosystem have been introduced, with other linear codes (including the algebraic geometry codes [9]) substituted within. Additional structure can lead to a reduction in key size but often at the cost of introducing vulnerabilities that allow an attacker to extract identifying characteristics of the underlying code from the public-key matrix; see, for instance, the recent work by Couvreur, Márquez-Corbella, and Pellikaan on algebraic geometry codes [10] as well as that of Márquez-Corbella, Martínez-Moro and Pellikaan [3]. Once the attacker can identify the underlying code, the fundamental assumption that secures the McEliece cryptosystem is no longer valid. The twisted construction presents a challenge to the attacker in that its square is not readily identifiable due to its large dimension. However, Lavauzelle and Renner recently demonstrated that for many parameter choices, twisted Reed–Solomon codes have a subfield subcode which is vulnerable to attack [11]. We discuss the possibility of such an attack for twisted Hermitian codes, pointing out a few key differences.
This paper is organized as follows. This section concludes with a brief guide to notation. Necessary background is covered in Section 2. In Section 3, we define the twisted Hermitian codes and explore their properties. In Section 4, we consider the McEliece cryptosytem employing certain families of twisted Hermitian codes. Section 4 considers a potential attack by casting the ideas of Lavauzelle and Renner in the Hermitian setting. A conclusion may be found in Section 5.
Notation. Given a vector space V over a field F and B : = v 1 , , v t V , we write v 1 , , v t F : = i = 1 t a i v i : a i F to denote the span of the set B; at times, we write B and when it is clear from the context, we omit the subscript F and simply write v 1 , , v t . The set of all m × n matrices with entries from a field F is written as F m × n , and I m F m × m denotes the m × m identity matrix over F .
The finite field with q elements is denoted by F q , where q is a power of a prime; N denotes the set of nonnegative integers; and Z + denotes the set of positive integers. An [ n , k , d ] code C over F q is an F q -subspace of F q n with k : = dim F q C and minimum distance d : = min w t ( c ) : c C { 0 } . Here, w t ( w ) = i : w i 0 denotes the Hamming weight of a word w F q n . Elements of C are called codewords. An [ n , k , d ] code is MDS, or maximum distance separable, if and only if d = n k + 1 . We say that a code is an [ n , k ] code if its length is n and its dimension is k. A generator matrix for an [ n , k ] code C over a field F q is any matrix M F q k × n whose rows form a basis for C . A generator matrix M = [ I k A ] is said to be in systematic form.

2. Preliminaries

We begin this section with a review of algebraic geometry codes and the necessary details on Hermitian codes followed by a discussion of the Schur product. There are a number of excellent references such as [12,13,14,15] which provide more comprehensive surveys.
Recall that an algebraic geometry code is of the form C ( D , G ) as described in Section 1. If deg G < n , then C ( D , G ) is a [ n , dim L ( G ) , n deg G ] code. At times, it will be useful to consider nested codes. If G G , where G is another divisor on X whose support does not contain any of the P i , then C ( D , G ) C ( D , G ) . See [16] for more on nested Hermitian codes. In this paper, we restrict our attention to the case where G = α P with α Z + , P is an F -rational point on X, and D is the sum of the remaining F -rational points; such codes are referred to as one-point codes in the literature and will be denoted here by C ( G ) .
Reed–Solomon codes are obtained from the construction above by taking X = P 1 ( F q ) , the projective line; k < n q ; G = k P where P denotes the unique point at infinity on X; and D to be the sum of all other rational points on X. It is well known that C ( k P ) is an [ n , k , n k + 1 ] code; that is, C ( k P ) is MDS. Notice that the alphabet size, meaning the cardinality of the field F q , is at least the length of the Reed–Solomon code; thus, to define a Reed–Solomon code of length n requires that F q n .
Beyond Reed–Solomon codes, the best understood algebraic geometry codes are Hermitian codes. For a prime power q, let X q denote the smooth, projective curve given by y q + y = x q + 1 over the finite field F q 2 ; X q is known as the Hermitian curve. The genus of X q is g = q ( q 1 ) 2 , and there are q 3 affine F q 2 -rational points of X q in the projective plane, meaning points the form a : b : 1 P 2 F q 2 with b q + b = a q + 1 , and a unique point at infinity P = ( 0 : 1 : 0 ) . Let n : = q 3 and P 1 , , P n denote the affine rational points of X q . Given a vector space V of functions on X q which do not have poles at any of the P i , 1 i n , a code can be defined by taking the image of the evaluation map
e v : V F q 2 n f f ( P 1 ) , , f ( P n ) .
For α N with 2 g < α < n , we consider the space of functions
L ( α P ) = x i y j : i , j N , j q 1 , δ ( x i y j ) α
where δ ( x i y j ) : = i q + j ( q + 1 ) is the pole order of x i y j at P . The one-point Hermitian code determined by α is the algebraic geometry code C ( α P ) = e v L α P . Henceforth, we use the term Hermitian code to mean one-point Hermitian curve. Notice that C ( α P ) is a code of length q 3 , dimension at least α + 1 g , with equality achieved when α 2 g + 1 , and minimum distance as given in [17].
Schur squares of algebraic geometry codes have been studied in [10,18]. Given a Hermitian code C ( α P ) ,
C ( α P ) 2 C ( 2 α P ) ,
and equality is achieved when α 2 g + 1 . In this case, C ( α P ) has dimension α + 1 g and
dim C ( α P ) 2 = dim C ( 2 α P ) = 2 α + 1 g < < ( α + 1 g ) + 1 2 ;
see also [19] for details. These ideas may be applied to more general algebraic geometry codes, meaning those constructed via evaluation maps analagous to e v using curves other than X q ([20] (Prop. 2)).
We seek a family of codes whose behavior under the Schur operation is indistinguishable from that of random codes. A guiding principle is the following result obtained by Cascudo, Cramer, Mirandola, and Zémor.
Proposition 1
([2] (Theorem 2.3)). Let n : N N be such that n ( k ) k + 1 2 . Then for some positive real number δ and k large enough,
Pr dim C 2 = k + 1 2 1 2 δ n ( k ) k + 1 2
where C is chosen uniformly at random from the family of all [ n ( k ) , k ] codes over F q whose generator matrices are in systematic form.
In keeping with Proposition 1, given a code C of dimension k, it is desirable for C 2 to have dimension close to k + 1 2 or quadratic in k. This is in contrast to that seen in (1) where the dimension is linear in k. This serves as motivation to consider twisted Hermitian codes which are defined in the next section.

3. Twisted Hermitian Codes

In [4], Beelen, Puchinger, and Rosenkilde introduce a new code construction based on generalized Reed–Solomon codes; the resulting codes can have Schur squares with larger dimensions than the Schur squares of the generalized Reed–Solomon codes themselves. The study of these new codes is carried on in [21] by Beelen, Bossert, Puchinger, and Rosenkilde. In this section, we adapt the construction to Hermitian codes, determine their basic properties, and apply new tools to address subtleties that arise in considering their squares. Decoding is also discussed.

3.1. Properties of Twisted Hermitian Codes

We begin by defining the twisted Hermitian codes. To do so, let
B ( α P ) : = x i y j : i , j N , j q 1 , δ ( x i y j ) α ,
which is a basis of L ( α P ) on the Hermitian curve X q : y q + y = x q + 1 .
Definition 1.
Consider α = u q + v ( q + 1 ) q 2 q 1 where u , v N . Let Z + ,
t = ( r 1 , s 1 ) , , ( r , s ) Z { 0 } 2
be a vector whose coordinates are ℓ pairwise distinct ordered pairs of nonzero integers, and
h = ( a 1 , b 1 ) , , ( a , b ) Z 2
be a vector whose coordinates are ℓ pairwise distinct ordered pairs of integers satisfying
a k q + b k ( q + 1 ) u q + v ( q + 1 ) < ( u + r k ) q + ( v + s k ) ( q + 1 ) < q 3
for k = 1 , , . Let η = ( η 1 , , η ) F q 2 { 0 } . The set of ( t , h , η ) -twisted bivariate polynomials is
B t , h , η ( α P ) = B ( α P ) k = 1 x a k y b k k = 1 x a k y b k + η k x u + r k y v + s k .
Let L t , h , η ( α P ) = B t , h , η ( α P ) . The twisted Hermitian code C t , h , η ( α P ) is
C t , h , η ( α P ) e v L t , h , η F q 2 n .
Remark 1.
It is immediate from the construction that C t , h , η ( α P ) has the same length as the code C ( α P ) . Furthermore,
dim C t , h , η ( α P ) = dim L t , h , η ( α P ) = | B t , h , η ( α P ) | = | B ( α P ) | = dim C ( α P ) .
In addition, a generator matrix for the twisted Hermitian code is
G t , h , η ( α P ) = e v ( f 1 ) e v ( f 2 ) e v ( f k )
where B t , h , η ( α P ) = f 1 , f 2 , , f k .
We sometimes write C t , h , η n , k ( α P ) to emphasize the length and dimension of a twisted Hermitian code.
Example 1.
Let q = 2 and α = 1 ( q ) + 1 ( q + 1 ) = 5 . The Hermitian curve X 2 is given by y 2 + y = x 3 , and we consider X 2 over a finite field of order q 2 = 4 , which may be described as F 4 = { 0 , 1 , a , a + 1 } Z 2 [ x ] / x 2 + x + 1 . Note that
B ( 5 P ) = { 1 , x , y , x 2 , x y } .
The q 3 + 1 = 8 rational points on X 2 other than P are enumerated below:
P 1 = ( 0 : 0 : 1 ) P 2 = ( 0 : 1 : 1 ) P 3 = ( 1 : a : 1 ) P 4 = ( 1 : a + 1 : 1 ) P 5 = ( a : a : 1 ) P 6 = ( a : a + 1 : 1 ) P 7 = ( a + 1 : a : 1 ) P 8 = ( a + 1 : a + 1 : 1 ) .
Choose = 2 and the following vectors:
t = ( 1 , 0 ) , ( 2 , 0 ) , h = ( 2 , 0 ) , ( 1 , 1 ) , η = 1 , a .
Then
k = 1 2 { x a k y b k } = { x 2 , x y } ,
and
k = 1 2 { x a k y b k + η k x u + r k y v + s k } = { x 2 + x 2 y , x y + a x 3 y }
so that
B t , h , η ( 5 P ) = { 1 , x , y , x 2 + x 2 y , x y + a x 3 y } .
The resulting space of functions is
L t , h , η ( 5 P ) = B t , h , η ( 5 P ) ,
and the twisted Hermitian code is
C t , h , η ( 5 P ) = e v L t , h , η ( 5 P ) .
A generator matrix G t , h , η ( 5 P ) for the twisted Hermitian code may be obtained by evaluating each element of B t , h , η ( 5 P ) at each of the P i , 1 i 8 , to obtain
G t , h , η ( 5 P ) = P 1 P 2   P 3     P 4    P 5    P 6     P 7       P 8 1 x y x 2 + x 2 y x y + a x 3 y [     1     1 1 1 1 1 1 1     0     0 1 1 a a a + 1 a + 1     0     1 a a + 1 a a + 1 a a + 1     0     0 a + 1 a a 1 1 a + 1     0     0 1 a 0 0 a a + 1 ] .
Because twisted Hermitian codes share some similarities with one-point Hermitian codes (such as length and dimension per Remark 1), it is reasonable to ask how the codes themselves compare and more pointedly if they are essentially the same codes. With this in mind, we next demonstrate that the twisted Hermitian codes are not one-point Hermitian codes.
To reveal the distinction between twisted Hermitian codes and one-point Hermitian codes, we determine the largest subcode of C t , h , η ( α P ) which is a one-point Hermitian code as well as its smallest supercode which is a one-point Hermitian code. Recall that t = ( r 1 , s 1 ) , , ( r , s ) Z { 0 } 2 and h = ( a 1 , b 1 ) , , ( a , b ) Z 2 . Let
α = min a i q + b i ( q + 1 ) : i = 1 , , 1
and
α = α + max r i q + s i ( q + 1 ) : i = 1 , , .
Then
L ( α P ) L t , h , η ( α P ) L ( α P )
follows from the definition of the twisted code by considering basis elements of the space of functions that are used to define the codewords. Therefore,
C ( α P ) C t , h , η ( α P ) C ( α P ) .
Notice that
dim C ( α P ) = x i y j B ( α P ) δ ( x i y j ) < min a i q + b i ( q + 1 ) : i = 1 , , < k ,
a k q + b k ( q + 1 ) u q + v ( q + 1 ) for all 1 k l , and the ( a k , b k ) are distinct. In addition,
dim C ( α P ) = α + max r k q + s k ( q + 1 ) k = 1 , , + 1 g k + q .
Hence, we conclude that twisted Hermitian codes are not one-point Hermitian codes. These observations are recorded in the next result, followed by their impact on bounding the minimum distance of the twisted Hermitian code.
Proposition 2.
Consider a twisted Hermitian code C t , h , η ( α P ) constructed as in Definition 1 with t = ( r 1 , s 1 ) , , ( r , s ) Z { 0 } 2 and h = ( a 1 , b 1 ) , , ( a , b ) Z 2 . Then
C ( α P ) C t , h , η ( α P ) C ( α P )
where
α = min a i q + b i ( q + 1 ) : i = 1 , , 1
and
α = α + max r i q + s i ( q + 1 ) : i = 1 , , .
According to Proposition 2, the minimum distance d of C t , h , η n , k ( α P ) satisfies
n α d C ( α P ) d d C ( α P ) .
Both d C ( α P ) and d C ( α P ) are known [17], being minimum distances of Hermitian codes. In the case that 2 g 2 < α and α < n , we have that
n α d C ( α P ) n α .
Thus, the twisted code C t , h , η n , k ( α P ) is capable of correcting at least t = n α 1 2 errors. We can use such a value of t for implementation within the McEliece cryptosystem (as detailed in Section 4), even though the code may be capable of correcting more errors.
Determining tighter bounds on the minimum distance of twisted Hermitian codes is an interesting but nontrivial problem. For instance, in the (perhaps simpler) Reed–Solomon situation, determining weights of codewords of twisted codes can amount to considering roots of sparse polynomials, which is a problem of current interest; see, for instance [22,23]. Another interesting question to consider is if the minimum distance of a twisted Hermitian code can attain that of a Hermitian code, especially given that there exist twisted Reed–Solomon codes which are MDS [4,24].
Example 2.
Consider the twisted Hermitian code C t , h , η ( 12 P ) with q = 3 , α = 12 ,
t = ( 1 , 0 ) , ( 0 , 1 ) , h = ( 1 , 2 ) , ( 0 , 3 ) ,
and η = η 1 , η 2 , where η 1 , η 2 F 9 satisfy the conditions of Definition 1. By Proposition 2,
α = 12 + max { r i q + s i ( q + 1 ) : i = 1 , 2 } = 16
and
α = min { a i q + b i ( q + 1 ) : i = 1 , 2 } 1 = 10
from which it follows that
C ( 10 P ) C t , h , η ( 12 P ) C ( 16 P ) .
According to ([13] (Theorem 5)), d C ( 10 P ) = 17 and d C ( 16 P ) = 11 so that
11 d C t , h , η ( 12 P ) 17 .

3.2. Squares of Twisted Hermitian Codes

Recall from (1) that a Hermitian code C ( α P ) has a Schur square with relatively small dimension: dim C ( α P ) 2 2 α + 1 g . In this section, we show that the twisted Hermitian code C t , h , η n , k ( α P ) may have a Schur square with much larger dimension in comparison to the square of the code itself.
Because the codes of interest are obtained by evaluating sets of functions, it is useful to consider the Schur product of sets. Given B , B F q [ x , y ] , let
B ̲ B b · b b B , b B ,
and
B 2 ̲ B ̲ B .
Lemma 1.
Let M denote the set of bivariate monomials
M x i y j : i , j N , 0 i q 2 1 , 0 j q 1 F q 2 [ x , y ] .
Then the evaluation map e v : M F q 2 n is an injective mapping.
Proof. 
Let the domain of e v be restricted to M as described above. It suffices to show that ker ( e v ) = { 0 } . Assume to the contrary that 0 p ( x , y ) M such that e v ( p ( x , y ) ) = 0 F q 2 n . Then every rational affine point ( x : y : 1 ) of the Hermitian curve X q also satisfies p ( x , y ) = 0 . Fix a F q 2 . Then there are then q distinct b i F q 2 such that ( a : b i : 1 ) is a rational point on the Hermitian curve X q . Then the univariate polynomial p ( a , y ) has q distinct zeros in F q 2 , despite the fact that deg ( p ( a , y ) ) q 1 . Hence p ( a , y ) 0 for all a F q 2 . On the other hand,
p ( x , y ) = j = 0 q 1 i = 0 q 2 1 a i j x i y j = j = 0 q 1 q j ( x ) y j
where q j ( x ) = i = 0 q 2 1 a i j x i and q j ( a ) = 0 for all a F q 2 . This implies the univariate polynomial q j ( x ) has q 2 zeros in F q 2 n , despite the fact that deg ( q j ) q 2 1 . As a result, p ( x , y ) 0 , which is a contradiction. □
We can use properties of the finite field to define a reduction scheme for bivariate polynomials.
Definition 2.
Suppose i , j N are such that 0 i 2 ( q 2 1 ) and 0 j q 1 . We define
x i y j ¯ x i y j if 0 i q 2 1 x i ( q 2 1 ) y j otherwise .
For f ( x , y ) = c k x i k y j k F q 2 [ x , y ] , we define
f ¯ c k x i k y j k ¯ .
It follows immediately that for f = c k x i k y j k , g = d h x i h y j h L ( α P ) ,
e v ( f · g ) = e v ( f · g ¯ ) .
Given f ( x , y ) = k = 1 n c k x i k y j k F q 2 [ x , y ] ,
δ ( f ) max i k q + j k ( q + 1 ) : k = 1 , , n .
If B = { f 1 , , f m } F q 2 [ x , y ] , then
δ B δ f k : k = 1 , , m .
We can now establish a lower bound on dim C t , h , η ( α P ) 2 .
Lemma 2.
Let C t , h , η ( α P ) be a twisted Hermitian code. Then
dim C t , h , η ( α P ) 2 D ¯
where D ¯ { δ ( f · g ¯ ) f , g L ( α P ) } .
Lemma 2 suggests that dim C t , h , η ( α P ) 2 can be made large by choosing t , h , η to maximize the size of D ¯ . Before applying it, we first establish a few relevant tools.
Given M as in Lemma 1, set
M 2 x i y j M : δ ( x i y j ) max δ M 2 .
Observe that for any prime power q,
max δ M 2 = ( q 2 1 ) q + ( q 1 ) ( q + 1 ) 2 2 g + 1 .
It follows that
M M 2 2 ̲ .
We make use of this observation in the following lemma.
Lemma 3.
Let A F [ x , y ] be a set of elements with distinct pole orders such that δ A δ M 2 . Then δ A 2 ̲ δ M g .
Proof. 
Since M M 2 2 ̲ , δ M δ ( M 2 ̲ ) . Observe that
δ ( M 2 2 ̲ ) δ ( M ) = δ M 2 2 ̲ δ M = ( q 3 + q 2 q 1 ) + 1 g q 3 = g .
Since δ ( A 2 ̲ ) δ ( M 2 2 ̲ ) , it follows that δ A 2 ̲ δ M g . □
Next, we employ a few basic results from additive number theory; specifically, we make use of the notion of a Sidon set.
Definition 3.
A set A N is a finite Sidon set provided it is finite and a , b , c , d A , a + b = c + d if and only if ( a , b ) = ( c , d ) or ( a , b ) = ( d , c ) .
Erdös and Turan show in [25] that every subset of a Sidon set is itself a Sidon set and that every nonempty subset of N contains a Sidon set. For finite and nonempty A N , let S [ A ] denote the largest subset of A that is a Sidon set. Gowers shows in [26] that S [ A ] 2 A .
We now introduce a family of twisted Hermitian codes with a large Schur square dimension. It will be useful to consider the map
ϕ q : N Z 2 w ( ( q + 1 ) w q w , w q w q ) .
Theorem 1.
For a given prime power q 0 , let α δ M be such that α q 3 + 2 q 3 + 1 + 1 4 and
P δ ( x i y j ) : x i y j M , δ ( x i y j ) α T δ ( x i y j ) : x i y j M , δ ( x i y j ) > α = { t 1 , , t } H P S [ P ] = { h 1 , , h }
satisfying H T . Let
h = ϕ ( h 1 ) , , ϕ ( h ) ; t = ϕ ( t 1 ) ( u , v ) , , ϕ ( t ) ( u , v ) ;
s 1 , , s be prime powers such that
F q 0 2 = F s 0 F s 1 F s = F q 2 ;
and η = η 1 , , η be such that η i F s i F s i 1 for i = 1 , , . Then
dim C t , h , η ( α P ) 2 k + 1 2 g
where k : = dim C t , h , η ( α P ) .
Proof. 
Let B = x i y j : δ ( x i y j ) S [ P ] and B t = x a m y b m + η m x u + r m y v + s m : m = 1 , , . Then C t , h , η ( α P ) = e v B B t and C t , h , η ( α P ) 2 = e v B B t 2 ̲ . Note that B B t is a set of functions with distinct pole orders. We claim that B B t 2 ̲ is a linearly independent set. Consider f m : = x i m y j m B and f m : = x a m y b m + η m x u + r m y v + s m B t . Then B B t 2 ̲ can be written as B B t 2 ̲ = A C D where A : = f m f m : δ ( f m ) , δ ( f m ) S [ P ] , C : = f m f m : δ ( f m ) S [ P ] , m = 1 , , , and D : = f m f m : m , m = 1 , , . Notice that if δ ( x i + i y j + j ) = δ ( x i + i y j + j ) for x i + i y j + j , x i + i y j + j A , then δ ( x i y j ) = δ ( x i y j ) (in which case δ ( x i y j ) = δ ( x i y j ) ) or δ ( x i y j ) = δ ( x i y j ) (in which case δ ( x i y j ) = δ ( x i y j ) ) follows from the properties of the Sidon set. In the first case, this implies that i = i and j = j . In the second, i = i and j = j . As a result, all elements of A have distinct pole orders. Furthermore, no pole order of an element of A is that of an element of C or D as δ ( f m f m ) α δ ( f ) for all f m f m A and f C D . Continuing in this way, we see that
B B t 2 ̲ = B + B t + 1 2 = k + 1 2 .
and applying Lemma 3 gives
δ B B t 2 ̲ δ M g
which implies that at most g elements of δ B B t 2 ̲ are not in M . Then at least k + 1 2 g elements of δ B B t 2 ̲ lie in M ; i.e., dim e v B B t 2 ̲ k + 1 2 g . Thus, dim C t , h , η ( α P ) 2 k + 1 2 g . □
This particular subfamily achieves a large Schur square dimension by first maximizing the size of D ¯ as seen in Theorem 2 and then forcing linear independence by choosing coefficients according to the nested field structure shown in (6).

3.3. Decoding Twisted Hermitian Codes

Tailored decoding algorithms for twisted Hermitian codes can be designed by borrowing ideas from those for twisted Reed–Solomon codes given in [4]. For a twisted Hermitian code C t , h , η ( α P ) with t Z 2 and received message m F q 2 n , coefficients γ 1 , . . . , γ F q 2 may be guessed (or selected at random). A decoding algorithm for a Hermitian code may then be applied to m e v i = 1 η i γ a i , b i x u + r i y v + s i as if it was a received word. This allows application of any Hermitian decoder. These rounds of guessing will only be successful if γ i = a a i , b i , for i = 1 , . . . , . Because the alphabet size is q 2 , this may require up to q 2 rounds of Hermitian decoding. As with twisted Reed–Solomon codes, these rounds might produce twisted Hermitian polynomials where γ i a a i , b i . The polynomials that are produced with these characteristics will be discarded as they do not yield valid codewords.
The efficiency of decoding twisted Hermitian codes may be considered by taking the cost of the Hermitian decoder used and multiplying it by the number of guessing rounds. Two methods of decoding Hermitian codes that might be utilized are those that have sub-quadratic efficiency, which is the best complexity known for decoding Hermitian codes. The Guruswami-Sudan Algorithm [27] has a Hermitian decoding efficiency of O ( n 2 + ω / 3 s ω m ) , where m and s are the multiplicity and list size parameters respectively and ω 3 is the exponent of matrix multiplication. This means that decoding twisted Hermitian codes using the Guruswami-Sudan Algorithm would have efficiency O ( q 2 n 2 + ω / 3 s ω m ) . Power decoding also has a similar decoding efficiency for Hermitian codes, which is O ( n 2 + ω / 3 p ω ) , where p is the powering parameter and ω is as defined before [28]. This means that the efficiency of decoding twisted Hermitian codes using power decoding is O ( q 2 n 2 + ω / 3 p ω ) . Determining more efficient and specialized decoding methods for twisted algebraic geometry codes remains a topic of study.

4. Applications of Twisted Hermitian Codes to the McEliece Cryptosystem

In this section, we consider the potential use of twisted Hermitian codes in a code-based cryptosystem. First, we abstract the key elements of the McEliece cryptosystem for use with an arbitrary linear code (in place of the Goppa code in [7]). Then we consider the role of squares in attacking the resulting system, noting how the twisted codes avoid direct distinguisher attack. This section concludes with considerations prompted by the recent attack of Lavauzelle and Renner [11] on a twisted Reed–Solomon code-based cryptosystem.
Let G be a k × n generator matrix for an [ n , k , d ] linear code C over a finite field F capable of correcting at least t errors. The public key is ( G PUB , t ) S G P , where S F k × k is nonsingular and P F n × n is a permutation matrix. The private key is ( S , P , D C ) , where D C is an efficient decoding algorithm of C . To transmit a message to a receiver Alice, Bob encodes the message m F k as m G PUB + e , where e F 1 × n has weight w t ( e ) t . Alice receives a transmission in the form x : = m S G P + e and initiates deciphering by left-multiplying x by P 1 to yield m S G + e P 1 . Alice then applies the decoding algorithm D C to retrieve m S and left-multiplies by S 1 to recover m. To maintain security, the underlying code C must not be revealed.

Role of Squares in the McEliece Cryptosystem

The Schur square distinguisher is an attack applied to the McEliece cryptosystem implemented with Reed–Solomon codes in [18]. Though the attacker does not know the linear code C underlying G PUB , the distinguisher may allow the attacker to know dim C 2 . The low-dimensional squares of Reed–Solomon and Hermitian codes imply that dim C 2 can be used to distinguish C from a random linear code. This is demonstrated in [18] where generalized Reed–Solomon codes are considered; Schur products are used to identify C 2 within the family from which it is drawn; and the Sidelnikov and Shestakov algorithm may then be used to identify C . See also [29] for other approaches involving generalized Reed–Solomon codes. Since dim C 2 can be an identifying characteristic of the family of codes from which C is drawn, the attacker may then use a family-specific structural attack on intercepted messages. Both twisted Reed–Solomon and twisted Hermitian codes may avoid a direct application of this attack if constructed to have large dimensional squares.
Based on the attacks described above, it is desirable to implement this code-based cryptosystem with a family of codes whose Schur squares are indistinguishable from those of random codes. With this in mind twisted Reed–Solomon codes were introduced in [4] and can be defined as follows.
Definition 4.
Let α 1 , , α n F q be pairwise distinct field elements, and fix 1 k n , 1 . Let h { 0 , , k 1 } , t { 1 , , n k } such that η ( F q { 0 } ) . A twisted Reed–Solomon code of length n and dimension k is given by:
C t , h , η ( k ) = f ( α 1 ) , , f ( α n ) : f i = 0 k 1 a i x i + j = 1 η j a h j x k 1 + t j : a i F q .
Consider the evaluation map
e v α : F q [ x ] F q n f f ( α 1 ) , , f ( α n ) .
Let q 0 be a prime, and q = q = q 0 2 . Lavazuelle and Renner showed in [11] that the subfield subcode C s u b = C t , h , η ( k ) F q 0 n of C t , h , η ( k ) is given by
C s u b = e v α ( x i ) : i { 0 , 1 , , k 1 } { h 1 , h 2 , , h } F q 0 .
Given that C s u b is not a Reed–Solomon code, the Sidelnikov-Shestakov attack cannot be directly applied. However, for 1 2 ( n 3 ) the Schur square C s u b 2 is a Reed–Solomon code of length n and dimension 2 k 1 . This idea forms the basis for an efficient key-recovery attack on the code-based cryptosystem employing twisted Reed Solomon codes.
The similarity in construction of twisted Hermitian codes and twisted Reed–Solomon codes suggests a possible attack on the cryptosystem based on the twisted Hermitian codes. In the remaining part of this section, we consider the possible components of such an attack. Recall the code C t , h , η ( α P ) over F q 2 constructed in Theorem 1 where
F q 0 2 = F s 0 F s 1 F s = F q 2 ,
and consider the subfield subcode
C t , h , η ( α P ) F q 0 2 n
where h = ( a 1 , b 1 ) , , ( a , b ) Z 2 .
Lemma 4.
Let f M F q 2 F q 2 [ x , y ] and P 1 , , P n X q 0 2 ( F q 0 2 ) . Then e v ( f ) F q 0 2 n if and only if f M 0 F q 0 2 where M 0 x i y j : i , j N , 0 i q 0 2 1 , 0 j q 0 1 .
Proof. 
Suppose f M 0 F q 0 2 and P 1 , , P n X q 0 2 ( F q 0 2 ) . Then it is clear that e v ( f ) F q 0 2 n . Conversely, consider c : = e v ( f ) F q 0 2 n where f M F q 2 F q 2 [ x , y ] . According to ([28] (Lemma 6)), there exists p = α F q 0 2 α F q 0 2 { α } x α α α β B α γ α , β β B α { β } y β β β such that e v ( p ) = c . Notice that p M 0 F q 0 2 M F q 2 . Since e v : M F q 2 F q 2 n is an injective map (as shown in Lemma 1) and c = e v ( p ) = e v ( f ) , it follows that f = p M 0 F q 0 2 . □
Proposition 3.
Given a twisted Hermitian code C = C t , h , η ( α P ) and P 1 , , P n X q 0 2 ( F q 0 2 ) ,
C F q 0 2 n = e v ( f ) : f B ( α P ) k = 1 x a k y b k F q 0 2 .
Proof. 
Consider e v ( f ) where f B ( α P ) k = 1 x a k y b k F q 0 2 . Then e v ( f ) C F q 0 2 n as each P i X q 0 ( F q 0 2 ) . On the other hand, suppose that e v ( f ) C F q 0 2 n . Then Lemma 4 applies so that f B ( α P ) k = 1 x a k y b k F q 0 2 . □
This result prompts the conjecture that the Schur square of the subfield subcode of a twisted Hermitian code in Proposition 3 is a Hermitian code. This is related to ([10] (Conjecture 19)). Positive resolution of these conjectures would lay the groundwork for an attack on a twisted Hermitian code-based cryptosystem.

5. Conclusions

In this paper, we present a new family of codes, called twisted Hermitian codes, whose construction is based on Hermitian codes. The length and dimension of the new codes is the same as the Hermitian codes, but these codes are not Hermitian codes. These new codes can have Schur squares larger than those of Hermitian codes. In particular, we identify a subfamily of the new codes that have Schur squares of dimension close to that expected of a random linear code. Codes of this subfamily are resistant to Schur square distinguishing when applied directly. However, the associated code-based cryptosystems may exhibit potential vulnerabilities related to square distinguisher attacks on particular subfield subcodes. This work leaves open several avenues that are worth investigation. Obtaining an improved lower bound on the twisted Hermitian codes, either in general or for the particular subfamily identified in this work, remains a challenge. Addressing it would allow one to consider if it is possible to obtain twisted Hermitian codes with parameters rivaling those of one-point Hermitian codes. It would also allow for the introduction of more noise in the associated code-based cryptosystem. We have not considered in this work the potential to construct twisted Hermitian codes C which are linearly complementary dual (LCD), meaning the intersection of C and its dual is trivial. In addition, the interested reader may find that it is possible to design tailored decoding algorithms for the twisted Hermitian codes beyond what is addressed in this work.

Author Contributions

Investigation, writing and revision: A.A., K.B., O.F., R.K., B.M., G.L.M. and Z.N. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by NSF DMS-1547399.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The work of the sixth author is supported in part by NSF DMS-2037833, NSF DMS-1802345, and the Commonwealth Cyber Initiative.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Pellikaan, R. On decoding by error location and dependent sets of error positions. Discret. Math. 1992, 106–107, 369–381. [Google Scholar] [CrossRef] [Green Version]
  2. Cascudo, I.; Cramer, R.; Mirandola, D.; Zémor, G. Squares of random linear codes. IEEE Trans. Inf. Theory 2015, 61, 1159–1173. [Google Scholar] [CrossRef] [Green Version]
  3. Márquez-Corbella, I.; Martínez-Moro, E.; Pellikaan, R. The non-gap sequence of a subcode of a generalized Reed-Solomon code. Des. Codes Cryptogr. 2013, 66, 317–333. [Google Scholar] [CrossRef]
  4. Beelen, P.; Puchinger, S.; Rosenkilde né Nielsen, J. Twisted Reed-Solomon codes. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 336–340. [Google Scholar]
  5. Sheekey, J. A new family of linear maximum rank distance codes. Adv. Math. Commun. 2016, 10, 475–488. [Google Scholar] [CrossRef] [Green Version]
  6. Lv, J.; Li, R.; Wang, J. Constructions of quasi-twisted quantum codes. Quantum Inf. Process. 2020, 19, 1–25. [Google Scholar] [CrossRef]
  7. McEliece, R.J. A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep. Space Netw. Prog. Rep. 1978, 44, 114–116. [Google Scholar]
  8. Berlekamp, E.; McEliece, R.; Van Tilborg, H. On the inherent interactability of certain coding problems. IEEE Trans. Inf. Theory 1978, IT-24, 384–386. [Google Scholar] [CrossRef]
  9. Janwa, H.; Moreno, O. McEliece public key cryptosystems using algebraic-geometric codes. Des. Codes Cryptogr. 1996, 8, 293–307. [Google Scholar] [CrossRef]
  10. Couvreur, A.; Márquez-Corbella, I.; Pellikaan, R. Cryptanalysis of McEliece cryptosystem based on algebraic geometry codes and their subcodes. IEEE Trans. Inf. Theory 2017, 63, 5404–5418. [Google Scholar] [CrossRef] [Green Version]
  11. Lavauzelle, J.; Renner, J. Cryptanalysis of a system based on twisted Reed-Solomon codes. Des. Codes Cryptogr. 2020, 88, 1285–1300. [Google Scholar] [CrossRef] [Green Version]
  12. Høholdt, T.; Lint, J.; Pellikaan, R. Algebraic geometry codes. In Handbook of Coding Theory; Elsevier: Amsterdam, The Netherlands, 1998; Volume 1, pp. 871–961. [Google Scholar]
  13. Stichtenoth, H. A note on Hermitian codes over GF(q2). IEEE Trans. Inform. Theory 1988, 34, 1345–1348. [Google Scholar] [CrossRef]
  14. Stichtenoth, H. Algebraic Function Fields and Codes, 2nd ed.; Springer: Berlin, Germany, 2008. [Google Scholar]
  15. Vladut, S.; Nogin, D.; Tsfasman, M. Algebraic Geometric Codes: Basic Notions; American Mathematical Society: Providence, RI, USA, 2007. [Google Scholar]
  16. Christensen, R.B.; Geil, O. On nested code pairs from the Hermitian curve. Finite Fields Their Appl. 2020, 68, 101742. [Google Scholar] [CrossRef]
  17. Yang, K.; Kumar, P.V. On the true minimum distance of Hermitian codes. In Coding Theory and Algebraic Geometry (Luminy, 1991); Volume 1518 of Lecture Notes in Mathematics; Springer: Berlin, Germany, 1992; pp. 99–107. [Google Scholar]
  18. Couvreur, A.; Gaborit, P.; Gauthier-Umana, V.; Otmani, A.; Tillich, J.-P. Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. Des. Codes Cryptogr. 2014, 73, 641–666. [Google Scholar] [CrossRef] [Green Version]
  19. Bolkema, J.; Gluesing-Luerssen, H.; Kelley, C.A.; Lauter, K.E.; Malmskog, B.; Rosenthal, J. Variations of the McEliece cryptosystem. In Algebraic Geometry for Coding Theory and Cryptography; Volume 9 of Association for Women in Mathematics Series; Springer: Cham, Switzerland, 2017; pp. 129–150. [Google Scholar]
  20. Pellikaan, R.; Márquez-Corbella, I. Error-correcting pairs for a public-key cryptosystem. J. Phys. Conf. Ser. 2017, 855, 012032. [Google Scholar] [CrossRef] [Green Version]
  21. Beelen, P.; Bossert, M.; Puchinger, S.; Rosenkilde, J. Structural properties of twisted Reed-Solomon codes with applications to cryptography. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 946–950. [Google Scholar]
  22. Cheng, Q.; Gao, S.; Rojas, J.M.; Wan, D. Sparse univariate polynomials with many roots over finite fields. Finite Fields Their Appl. 2017, 46, 235–246. [Google Scholar] [CrossRef] [Green Version]
  23. Kelley, Z. Roots of sparse polynomials over a finite field. LMS J. Comput. Math. 2016, 19, 196–204. [Google Scholar] [CrossRef] [Green Version]
  24. Liu, H.; Liu, S. New constructions of MDS twisted Reed-Solomon codes and LCD MDS codes. arXiv 2020, arXiv:2008.03708. [Google Scholar]
  25. Erdos, P.; Turan, P. On a problem of Sidon in additive number theory, and on some related problems. J. London Math. Soc. 1941, 16, 212–215. [Google Scholar] [CrossRef]
  26. Gowers, T. What are Dense Sidon Subsets of {1,2,…,n} Like? Available online: https://gowers.wordpress.com/2012/07/13/what-are-dense-sidon-subsets-of-12-n-like/ (accessed on 16 July 2018).
  27. Guruswami, V.; Sudan, M. Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Trans. Inf. Theory 1999, 45, 1757–1767. [Google Scholar] [CrossRef] [Green Version]
  28. Nielsen, J.S.R.; Beelen, P. Sub-quadratic decoding of one-point Hermitian codes. IEEE Trans. Inf. Theory 2015, 61, 3225–3240. [Google Scholar] [CrossRef] [Green Version]
  29. Wieschebrink, C. Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. In Post-Quantum Cryptography; Springer: Berlin/Heidelberg, Germany, 2010; pp. 61–72. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Allen, A.; Blackwell, K.; Fiol, O.; Kshirsagar, R.; Matsick, B.; Matthews, G.L.; Nelson, Z. Twisted Hermitian Codes. Mathematics 2021, 9, 40. https://doi.org/10.3390/math9010040

AMA Style

Allen A, Blackwell K, Fiol O, Kshirsagar R, Matsick B, Matthews GL, Nelson Z. Twisted Hermitian Codes. Mathematics. 2021; 9(1):40. https://doi.org/10.3390/math9010040

Chicago/Turabian Style

Allen, Austin, Keller Blackwell, Olivia Fiol, Rutuja Kshirsagar, Bethany Matsick, Gretchen L. Matthews, and Zoe Nelson. 2021. "Twisted Hermitian Codes" Mathematics 9, no. 1: 40. https://doi.org/10.3390/math9010040

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop