Attack method against the McEliece cryptosystem based on the correlative quasic-cyclic codes set

被引:0
|
作者
机构
[1] State Key Lab. of Integrated Service Networks, Xidian Univ.
[2] College of Electronic Engineering, Xi'an Univ. of Posts and Telecommunications
来源
Liu, J. (jmliu@mail.xidian.edu.cn) | 1600年 / Science Press卷 / 41期
关键词
Attack algorithm; McEliece public key cryptosystem; QC-LDPC code; Work factor;
D O I
10.3969/j.issn.1001-2400.2014.02.003
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Focusing on the security of McEliece public key cryptosystem based on the QC-LDPC code, a new attack algorithm based on the correlative quasi-cyclic (QC) code word is proposed. As the code word in the QC code set is shifted cyclically which is equivalent to information retransmission, the algorithm's effect is better. Performance is analyzed from probability of the correct decipher and computational complexity. Simulation results show that the proposed algorithm possesses a higher probability of the correct decipher (0.999) and a lower work factor (240.7).
引用
收藏
页码:15 / 19+50
相关论文
共 10 条
  • [1] Baldi M., Chiaraluce F., Cryptanalysis of a new instance of mceliece cryptosystem based on QC-LDPC codes, IEEE International Symposium on Information Theory, pp. 2591-2595, (2007)
  • [2] Zhang G., Wang X., On the existence of a class of QC-LDPC codes with girth at least six, Journal of Xidian University, 38, 3, pp. 136-139, (2011)
  • [3] Baldi M., Bodrato M., Chiaraluce F., A new analysis of the mceliece cryptosystem based on QC-LDPC codes, Security and Cryptography for Networks, pp. 246-262, (2008)
  • [4] Baldi M., Bianchi M., Chiaraluce F., Security and complexity of the mceliece cryptosystem based on QC-LDPC codes
  • [5] Cui J., Bai B., Guo X., Improved cycle elimination algorithm for construction of QC-LDPC codes, Journal of Xidian University, 37, 4, pp. 700-704, (2010)
  • [6] Chen C., Bai B., Wang X., A class of nonbinary quasi-cyclic LDPC codes with a low-density generator matrix, Journal of Xidian University, 37, 3, pp. 412-416, (2010)
  • [7] Mceliece R.J., A public-key cryptosystem based on algebraic
  • [8] Lee P.J., Brickell E.F., An observation on the security of mceliece's public-key cryptosystem, Workshop on the Theory and Application of Cryptographic Techniques, pp. 275-280, (1988)
  • [9] Adams C.M., Meijer H., Security-related comments regarding mceliece's public-key cryptosystem, IEEE Transactions on Information Theory, 35, 2, pp. 454-455, (1989)
  • [10] Sun H.M., Improving the security of the mceliece public-key cryptosystem, International Conference on the Theory and Application of Cryptology and Information Security, pp. 200-213, (1998)