A Summary of McEliece-Type Cryptosystems and their Security

被引:33
作者
Engelbert, D. [1 ]
Overbeck, R. [2 ]
Schmidt, A. [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Cryptog & Comp Algebra Grp, Hochschulstr 10, D-64298 Darmstadt, Germany
[2] Tech Univ Darmstadt, Dept Comp Sci, Cryptog & Comp Algebra Grp, GK Elect Commerce, D-64298 Darmstadt, Germany
关键词
McEliece cryptosystem; public key cryptography; code based cryptography; Goppa codes;
D O I
10.1515/JMC.2007.009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we give an overview of some of the cryptographic applications which were derived from the proposal of R.J. McEliece to use error correcting codes for cryptographic purposes. Code based cryptography is an interesting alternative to number theoretic cryptography. Many basic cryptographic functions like encryption, signing, hashing, etc. can be realized using code theoretic concepts. In this paper we briefly show how to correct errors in transmitted data by employing Goppa codes and describe possible applications to public key cryptography. The main focus of this paper is to provide detailed insight into the state of art of cryptanalysis of the McEliece cryptosystem and the effect on different cryptographic applications. We conclude, that for code based cryptography a public key of 88KB offers sufficient security for encryption, while we need a public key of at least 597KB for secure signing.
引用
收藏
页码:151 / 199
页数:49
相关论文
共 49 条
[1]   SECURITY OF XINMEI DIGITAL SIGNATURE SCHEME [J].
ALABBADI, M ;
WICKER, SB .
ELECTRONICS LETTERS, 1992, 28 (09) :890-891
[2]  
Alabbadi M, 1995, LECT NOTES COMPUT SC, V917, P238, DOI 10.1007/BFb0000438
[3]  
ALJABRI A, 2001, LNCS, V2260, P1
[4]  
Augot D, 2005, LECT NOTES COMPUT SC, V3715, P64
[5]   INHERENT INTRACTABILITY OF CERTAIN CODING PROBLEMS [J].
BERLEKAMP, ER ;
MCELIECE, RJ ;
VANTILBORG, HCA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (03) :384-386
[6]  
Berson TA, 1997, LECT NOTES COMPUT SC, V1294, P213
[7]   CRYPTANALYSIS - A SURVEY OF RECENT RESULTS [J].
BRICKELL, EF ;
ODLYZKO, AM .
PROCEEDINGS OF THE IEEE, 1988, 76 (05) :578-593
[8]  
Canteaut A, 1998, LECT NOTES COMPUT SC, V1514, P187
[9]  
Canteaut A., 1995, LIENS9521 DEP MATH
[10]  
Chabaud F., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P131, DOI 10.1007/BFb0053430