On the security of the McEliece public-key cryptosystern

被引:0
作者
Sendrier, N [1 ]
机构
[1] INRIA Rocquencourt, Project CODES, F-78153 Le Chesnay, France
来源
INFORMATION, CODING AND MATHEMATICS | 2002年 / 687卷
关键词
Public-key cryptography; McEliece cryptosystem; Niedereitter cryptosystem; error correcting codes; Goppa codes; syndrome decoding; proof of security; digital signature;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As RSA, the McEliece public-key cryptosystem has successfully resisted more than 20 years of cryptanalysis effort. However, despite the fact that it is faster, it was not as successful as RSA as far as applications are concerned. This is certainly due to its very large public key and probably also to the belief that the system could not be used for the design of a digital signature scheme. We present here the state of art of the implementation and the security of the two main variants of code-based public-key encryption schemes (McEliece's and Niedereitter's) as well as the more recent signature scheme derived from them. We also show how it is possible to formally reduce the security of these systems to two well identified algorithmic problems. The decoding attack (aimed on one particular ciphertext) is connected to the NP-complete syndrome decoding problem. The structural attack (aimed on the public key) is connected to the problem of distinguishing binary Goppa codes from random codes. We conjecture that both these problems are difficult and present some arguments to support this claim.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [31] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    CRYPTOGRAPHY, 2023, 7 (04)
  • [32] Probability theory and public-key cryptography
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 285 - 290
  • [33] A generalization of the ElGamal public-key cryptosystem
    Ranasinghe, Rajitha
    Athukorala, Pabasara
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08) : 2395 - 2403
  • [34] ANOTHER PRACTICAL PUBLIC-KEY CRYPTOSYSTEM
    SHIMADA, M
    ELECTRONICS LETTERS, 1992, 28 (23) : 2146 - 2147
  • [35] Deniable Public-Key Authenticated Quantum Key Exchange
    van Wier, Jeroen
    Atashpendar, Arash
    Roenne, Peter
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, SECITC 2023, 2024, 14534 : 97 - 112
  • [36] Storage and computation optimization of public-key schemes on embedded devices
    Winderickx, Jori
    Braeken, An
    Mentens, Nele
    2018 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2018,
  • [37] Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
    Huang H.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (03): : 220 - 226
  • [38] Public-Key Encryption Based on Chebyshev Polynomials
    L. Kocarev
    J. Makraduli
    P. Amato
    Circuits, Systems and Signal Processing, 2005, 24 : 497 - 517
  • [39] Public-Key Cryptography from Different Assumptions
    Applebaum, Benny
    Barak, Boaz
    Wigderson, Avi
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 171 - 180
  • [40] Quantum public-key designated verifier signature
    Xin, Xiangjun
    Ding, Li
    Li, Chaoyang
    Sang, Yongxuan
    Yang, Qinglan
    Li, Fagen
    QUANTUM INFORMATION PROCESSING, 2022, 21 (01)