RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2025 Issue 18, Pages 188–194 (Mi pdma710)

Mathematical Methods of Cryptography

Attack on the ECC2 cryptosystem and the McEliece cryptosystem built on elliptic codes

Yu. D. Shkuratov


Abstract: The paper is devoted to McEliece-type code-based cryptosystems, which can potentially be used as post-quantum ones. Modifications of the McEliece cryptosystem using algebraic geometric codes associated with an elliptic curve are considered; in particular, the ECC2 cryptosystem is examined. A polynomial algorithm is proposed that uses the Schur — Hadamard product operations of linear codes and the calculation of the dual code, which allows one to restore the elliptic curve and the divisor $D$ from the generator matrix of the corresponding elliptic $[n,k]_{q}$-code $\mathcal{C}_{\mathcal{L}}(D,kP_{\infty})$ for $3<k<(n-4)/{2}$. The complexity of this algorithm is calculated as $O((k^{2}+q^{2})n^{2})$ operations in a finite field.

Keywords: McEliece cryptosystem, ECC2, algebraic geometry codes, AG-codes, elliptic codes.

UDC: 519.725

DOI: 10.17223/2226308X/18/38



© Steklov Math. Inst. of RAS, 2026