Paper 2025/632
On breaking McEliece keys using brute force
Abstract
In the McEliece public-key encryption scheme, a private key is almost always not determined uniquely by its associated public key. This paper gives a structural characterization of equivalent private keys, generalizing a result known for the more approachable special case $\lvert L\rvert=q$. These equivalences reduce the cost estimate for a simple private-key search using the support-splitting algorithm (SSA) by a polynomial but practically very substantial factor. We provide an optimized software implementation of the SSA for this kind of key search and demonstrate its capabilities in practice by solving a key-recovery challenge with a naïve a‑priori cost estimate of $2^{83}$ bit operations in just ${\approx}\,1400$ core days, testing ${\approx}\,9400$ private-key candidates per core and second in the process. We stress that the speedup from those equivalences is merely polynomial and does not indicate any weakness in realistic instantiations of the McEliece cryptosystem, whose parameter choices are primarily constrained by decoding attacks rather than ludicrously more expensive key-recovery attacks.
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- code-based cryptographyconcrete cryptanalysisGoppa codes
- Contact author(s)
- lorenz @ yx7 cc
- History
- 2025-04-11: approved
- 2025-04-07: received
- See all versions
- Short URL
- https://ia.cr/2025/632
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/632, author = {Lorenz Panny}, title = {On breaking {McEliece} keys using brute force}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/632}, year = {2025}, url = {https://eprint.iacr.org/2025/632} }