Some (almost) optimally extendable linear codes

  • Claude Carlet
  • , Chengju Li*
  • , Sihem Mesnager
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

Side-channel attacks and fault injection attacks are nowadays important cryptanalysis methods on the implementations of block ciphers, which represent huge threats. Direct sum masking (DSM) has been proposed to protect the sensitive data stored in registers against both SCA and FIA. It uses two linear codes C and D whose sum is direct and equals Fqn. The resulting security parameter is the pair (d(C) - 1 , d(D) - 1). For being able to protect not only the sensitive input data stored in registers against SCA and FIA but the whole algorithm (which is required at least in software applications), it is useful to change C and D into C, which has the same minimum distance as C, and D, which may have smaller dual distance than D. Precisely, D is the linear code obtained by appending on the right of its generator matrix the identity matrix with the same number of rows. It is then highly desired to construct linear codes D such that d(D′⊥) is very close to d(D). In such case, we say that D is almost optimally extendable (and is optimally extendable if d(D′⊥)=d(D⊥)). In general, it is notoriously difficult to determine the minimum distances of the codes D and D′⊥ simultaneously. In this paper, we mainly investigate constructions of (almost) optimally extendable linear codes from irreducible cyclic codes and from the first-order Reed–Muller codes. The minimum distances of the codes D, D, D, and D′⊥ are determined explicitly and their weight enumerators are also given. Furthermore, several families of optimally extendable codes are found (for the second time) among such linear codes.

Original languageEnglish
Pages (from-to)2813-2834
Number of pages22
JournalDesigns, Codes, and Cryptography
Volume87
Issue number12
DOIs
StatePublished - 1 Dec 2019

Keywords

  • Cyclic code
  • Fault injection attack
  • Linear code
  • Reed–Muller code
  • Side-channel attack
  • Weight distribution

Fingerprint

Dive into the research topics of 'Some (almost) optimally extendable linear codes'. Together they form a unique fingerprint.

Cite this