Open Access iconOpen Access

ARTICLE

crossmark

An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm

Bing Liu*, Ting Nie, Yansong Liu, Weibo Hu

Department of Cryptography Science and Technology, Beijing Electronic Science and Technology Institute, Beijing, 100070, China

* Corresponding Author: Bing Liu. Email: email

Computers, Materials & Continua 2025, 84(3), 4583-4599. https://doi.org/10.32604/cmc.2025.065296

Abstract

Among the four candidate algorithms in the fourth round of NIST standardization, the BIKE (Bit Flipping Key Encapsulation) scheme has a small key size and high efficiency, showing good prospects for application. However, the BIKE scheme based on QC-MDPC (Quasi Cyclic Medium Density Parity Check) codes still faces challenges such as the GJS attack and weak key attacks targeting the decoding failure rate (DFR). This paper analyzes the BGF decoding algorithm of the BIKE scheme, revealing two deep factors that lead to DFR, and proposes a weak key optimization attack method for the BGF decoding algorithm based on these two factors. The proposed method constructs a new weak key set, and experiment results eventually indicate that, considering BIKE’s parameter set targeting 128-bit security, the average decryption failure rate is lowerly bounded by . This result not only highlights a significant vulnerability in the BIKE scheme but also provides valuable insights for future improvements in its design. By addressing these weaknesses, the robustness of QC-MDPC code-based cryptographic systems can be enhanced, paving the way for more secure post-quantum cryptographic solutions.

Keywords

BIKE; BGF decoding algorithm; weak key attack; GJS attack

Cite This Article

APA Style
Liu, B., Nie, T., Liu, Y., Hu, W. (2025). An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm. Computers, Materials & Continua, 84(3), 4583–4599. https://doi.org/10.32604/cmc.2025.065296
Vancouver Style
Liu B, Nie T, Liu Y, Hu W. An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm. Comput Mater Contin. 2025;84(3):4583–4599. https://doi.org/10.32604/cmc.2025.065296
IEEE Style
B. Liu, T. Nie, Y. Liu, and W. Hu, “An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm,” Comput. Mater. Contin., vol. 84, no. 3, pp. 4583–4599, 2025. https://doi.org/10.32604/cmc.2025.065296



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 802

    View

  • 498

    Download

  • 0

    Like

Related articles

Share Link