**4. Security Comments**

In this section, we examine the security of the new system. We recommend using a linear [*n*, *k*, 2*t* + 1]-code over F*q*. The decryption method is based on the bounded distance decoding task. In order to be a secure public-key cryptosystem, the following conditions should be implemented.

