Open Access
ARTICLE
An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm
Department of Cryptography Science and Technology, Beijing Electronic Science and Technology Institute, Beijing, 100070, China
* Corresponding Author: Bing Liu. Email:
Computers, Materials & Continua 2025, 84(3), 4583-4599. https://doi.org/10.32604/cmc.2025.065296
Received 09 March 2025; Accepted 23 May 2025; Issue published 30 July 2025
Abstract
Among the four candidate algorithms in the fourth round of NIST standardization, the BIKE (Bit Flipping Key Encapsulation) scheme has a small key size and high efficiency, showing good prospects for application. However, the BIKE scheme based on QC-MDPC (Quasi Cyclic Medium Density Parity Check) codes still faces challenges such as the GJS attack and weak key attacks targeting the decoding failure rate (DFR). This paper analyzes the BGF decoding algorithm of the BIKE scheme, revealing two deep factors that lead to DFR, and proposes a weak key optimization attack method for the BGF decoding algorithm based on these two factors. The proposed method constructs a new weak key set, and experiment results eventually indicate that, considering BIKE’s parameter set targeting 128-bit security, the average decryption failure rate is lowerly bounded by . This result not only highlights a significant vulnerability in the BIKE scheme but also provides valuable insights for future improvements in its design. By addressing these weaknesses, the robustness of QC-MDPC code-based cryptographic systems can be enhanced, paving the way for more secure post-quantum cryptographic solutions.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools