The security of the BIKE scheme depends on a complex mathematical structure built upon QC-MDPC codes. This scheme is constructed using the Niederreiter framework and the application of transformation. Its security is based on the complexity of two main mathematical problems: the QCSD Problem and the QCCF Problem. The BIKE v5.2 scheme is the latest version of this scheme. This study aims to mathematically analyze the characteristics forming the BIKE v5.2, focusing on QC-MDPC codes, the Niederreiter framework, and the transformation, as well as the QCSD and QCCF problems. The method used in this study is a systematic literature review combined with theoretical analysis. The study highlights how the interplay of these three components forms a rational and resilient design. Although the BIKE v5.2 scheme was not selected for standardization by NIST, it is still capable of producing an efficient, secure, and relevant KEM for post-quantum cryptography. Through mathematical analysis of the QC-MDPC construction, the formulation of the complex computational problems QCCF and QCSD, and the rational design of the Niederreiter framework with the transformation, this study demonstrates that BIKE has a strong security foundation and resistance to both classical and quantum attacks.
Copyrights © 2026