On the security of the McEliece public-key cryptosystern

被引:0
作者
Sendrier, N [1 ]
机构
[1] INRIA Rocquencourt, Project CODES, F-78153 Le Chesnay, France
来源
INFORMATION, CODING AND MATHEMATICS | 2002年 / 687卷
关键词
Public-key cryptography; McEliece cryptosystem; Niedereitter cryptosystem; error correcting codes; Goppa codes; syndrome decoding; proof of security; digital signature;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As RSA, the McEliece public-key cryptosystem has successfully resisted more than 20 years of cryptanalysis effort. However, despite the fact that it is faster, it was not as successful as RSA as far as applications are concerned. This is certainly due to its very large public key and probably also to the belief that the system could not be used for the design of a digital signature scheme. We present here the state of art of the implementation and the security of the two main variants of code-based public-key encryption schemes (McEliece's and Niedereitter's) as well as the more recent signature scheme derived from them. We also show how it is possible to formally reduce the security of these systems to two well identified algorithmic problems. The decoding attack (aimed on one particular ciphertext) is connected to the NP-complete syndrome decoding problem. The structural attack (aimed on the public key) is connected to the problem of distinguishing binary Goppa codes from random codes. We conjecture that both these problems are difficult and present some arguments to support this claim.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [41] Quadratic compact knapsack public-key cryptosystem
    Wang, Baocang
    Hu, Yupu
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 59 (01) : 194 - 206
  • [42] The Magic of Elliptic Curves and Public-Key Cryptography
    Florian Heß
    Andreas Stein
    Sandra Stein
    Manfred Lochter
    Jahresbericht der Deutschen Mathematiker-Vereinigung, 2012, 114 (2) : 59 - 88
  • [43] Reducing Key Length of the McEliece Cryptosystem
    Berger, Thierry P.
    Cayrel, Pierre-Louis
    Gaborit, Philippe
    Otmani, Ayoub
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 77 - +
  • [44] Logic for verifying public-key cryptographic protocols
    Coffey, T
    Saidha, P
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
  • [45] Cryptanalysis of Krouk's public-key cipher
    daRocha, VC
    deMacedo, DL
    ELECTRONICS LETTERS, 1996, 32 (14) : 1279 - 1280
  • [46] Public-key cryptography using paraunitary matrices
    Delgosha, Farshid
    Fekri, Faramarz
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (09) : 3489 - 3504
  • [47] Reaction attacks against several public-key cryptosystems
    Hall, C
    Goldberg, I
    Schneier, B
    INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 2 - 12
  • [48] A Petri net based public-key cryptography: PNPKC
    Ge, QW
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (06): : 1532 - 1535
  • [49] A public-key protocol for social networks with private relationships
    Domingo-Ferrer, Josep
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4617 : 373 - 379
  • [50] Public-Key Infrastructure for Smart Meters using Blockchains
    Melo, Wilson, Jr.
    Machado, Raphael C. S.
    Peters, Daniel
    Moni, Mahbuba
    2020 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 & IOT (METROIND4.0&IOT), 2020, : 429 - 434