On the security of the McEliece public-key cryptosystern

被引:0
|
作者
Sendrier, N [1 ]
机构
[1] INRIA Rocquencourt, Project CODES, F-78153 Le Chesnay, France
来源
INFORMATION, CODING AND MATHEMATICS | 2002年 / 687卷
关键词
Public-key cryptography; McEliece cryptosystem; Niedereitter cryptosystem; error correcting codes; Goppa codes; syndrome decoding; proof of security; digital signature;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As RSA, the McEliece public-key cryptosystem has successfully resisted more than 20 years of cryptanalysis effort. However, despite the fact that it is faster, it was not as successful as RSA as far as applications are concerned. This is certainly due to its very large public key and probably also to the belief that the system could not be used for the design of a digital signature scheme. We present here the state of art of the implementation and the security of the two main variants of code-based public-key encryption schemes (McEliece's and Niedereitter's) as well as the more recent signature scheme derived from them. We also show how it is possible to formally reduce the security of these systems to two well identified algorithmic problems. The decoding attack (aimed on one particular ciphertext) is connected to the NP-complete syndrome decoding problem. The structural attack (aimed on the public key) is connected to the problem of distinguishing binary Goppa codes from random codes. We conjecture that both these problems are difficult and present some arguments to support this claim.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [21] Hexi McEliece Public Key Cryptosystem
    Ilanthenral, K.
    Easwarakumar, K. S.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2595 - 2603
  • [22] Public-Key Cryptanalysis
    Nguyen, Phong Q.
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 67 - 119
  • [23] A Modified McEliece Public-Key Cryptosystem Based On Irregular Codes Of QC-LDPC And QC-MDPC
    Hashemi, Seyed Hesam Odin
    Hodtani, Ghosheh Abed
    2019 27TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2019), 2019, : 1373 - 1376
  • [24] A Framework for Automatic Security Proof of public-key cryptography in Computational Model
    Guang Yan
    Fei Jin-Long
    Gu Chun-Xiang
    Zhu Yue-Fei
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 882 - 886
  • [25] Public-key locally-decodable codes
    Hemenway, Brett
    Ostrovsky, Rafail
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 126 - 143
  • [26] The cubic public-key transformation
    Kak, Subhash
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2007, 26 (03) : 353 - 359
  • [27] Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over Z/pkZ
    Yoshioka, Daisaburo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (10) : 2204 - 2208
  • [28] Memory-Tight Multi-challenge Security of Public-Key Encryption
    Jaeger, Joseph
    Kumar, Akshaya
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 454 - 484
  • [29] A Summary of McEliece-Type Cryptosystems and their Security
    Engelbert, D.
    Overbeck, R.
    Schmidt, A.
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2007, 1 (02) : 151 - 199
  • [30] On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field ZN
    Liao, Xiaofeng
    Chen, Fei
    Wong, Kwok-Wo
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (10) : 1392 - 1401