On the security of the McEliece public-key cryptosystern

被引:0
|
作者
Sendrier, N [1 ]
机构
[1] INRIA Rocquencourt, Project CODES, F-78153 Le Chesnay, France
来源
INFORMATION, CODING AND MATHEMATICS | 2002年 / 687卷
关键词
Public-key cryptography; McEliece cryptosystem; Niedereitter cryptosystem; error correcting codes; Goppa codes; syndrome decoding; proof of security; digital signature;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As RSA, the McEliece public-key cryptosystem has successfully resisted more than 20 years of cryptanalysis effort. However, despite the fact that it is faster, it was not as successful as RSA as far as applications are concerned. This is certainly due to its very large public key and probably also to the belief that the system could not be used for the design of a digital signature scheme. We present here the state of art of the implementation and the security of the two main variants of code-based public-key encryption schemes (McEliece's and Niedereitter's) as well as the more recent signature scheme derived from them. We also show how it is possible to formally reduce the security of these systems to two well identified algorithmic problems. The decoding attack (aimed on one particular ciphertext) is connected to the NP-complete syndrome decoding problem. The structural attack (aimed on the public key) is connected to the problem of distinguishing binary Goppa codes from random codes. We conjecture that both these problems are difficult and present some arguments to support this claim.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [1] Enhancing the security of the McEliece public-key cryptosystem
    Sun, HM
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2000, 16 (06) : 799 - 812
  • [2] Weak keys in the McEliece public-key cryptosystem
    Loidreau, P
    Sendrier, N
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (03) : 1207 - 1211
  • [3] QUANTUM MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    Fujita, Hachiro
    QUANTUM INFORMATION & COMPUTATION, 2012, 12 (3-4) : 181 - 202
  • [4] The Homomorphic Properties of McEliece Public-key Cryptosystem
    Zhao Cheng-cheng
    Yang Ya-tao
    Li Zi-chen
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 39 - 42
  • [5] Further cryptanalysis of the McEliece public-key cryptosystem
    Sun, HM
    IEEE COMMUNICATIONS LETTERS, 2000, 4 (01) : 18 - 19
  • [6] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [7] Enhanced Public Key Security for the McEliece Cryptosystem
    Baldi, Marco
    Bianchi, Marco
    Chiaraluce, Franco
    Rosenthal, Joachim
    Schipani, Davide
    JOURNAL OF CRYPTOLOGY, 2016, 29 (01) : 1 - 27
  • [8] Enhanced Public Key Security for the McEliece Cryptosystem
    Marco Baldi
    Marco Bianchi
    Franco Chiaraluce
    Joachim Rosenthal
    Davide Schipani
    Journal of Cryptology, 2016, 29 : 1 - 27
  • [9] A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem
    Shoufan, Abdulhadi
    Wink, Thorsten
    Molter, H. Gregor
    Huss, Sorin A.
    Kohnert, Eike
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (11) : 1533 - 1546
  • [10] PKC-PC: A variant of the McEliece public-key cryptosystem based on polar codes
    Hooshmand, Reza
    Koochak Shooshtari, Masoumeh
    Reza Aref, Mohammad
    IET COMMUNICATIONS, 2020, 14 (12) : 1883 - 1893