Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes

被引:0
作者
Farkas, P. [1 ,2 ]
机构
[1] Slovak Univ Technol Bratislava, Fac Elect Engn & Informat Technol, Inst Multimedia ICT, Bratislava, Slovakia
[2] Pan European Univ, Fac Informat, Inst Appl Informat, Bratislava, Slovakia
来源
2019 EIGHTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST) | 2019年
关键词
reaction attacks; McEliece cryptosystem; QCLDPC codes; countermeasures; fountain codes; ARQ;
D O I
10.1109/est.2019.8806207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently two countermeasures against reaction Attacks on McEliece cryptosystems with QC-LDPC and QC-MDPC codes were proposed. In this paper further heuristic discussion and elements of the protocol proposals are presented which can bring a system with these techniques closer to practical applications and also can enhance the overall security of the systems which will use them.
引用
收藏
页数:4
相关论文
共 17 条
[1]  
[Anonymous], 2018140 CRYPT EPRINT
[2]  
[Anonymous], 1963, Low-Density Parity-Check Codes
[3]   Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem [J].
Baldi, Marco ;
Chiaraluce, Franco ;
Garello, Roberto ;
Mininni, Francesco .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :951-+
[4]   Enhanced Public Key Security for the McEliece Cryptosystem [J].
Baldi, Marco ;
Bianchi, Marco ;
Chiaraluce, Franco ;
Rosenthal, Joachim ;
Schipani, Davide .
JOURNAL OF CRYPTOLOGY, 2016, 29 (01) :1-27
[5]   LDPC Codes in the McEliece Cryptosystem: Attacks and Countermeasures [J].
Baldi, Marco .
ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 :160-174
[6]   Modelling non-linear effects of dark energy [J].
Bose, Benjamin ;
Baldi, Marco ;
Pourtsidou, Alkistis .
JOURNAL OF COSMOLOGY AND ASTROPARTICLE PHYSICS, 2018, (04)
[7]   A Reaction Attack on the QC-LDPC McEliece Cryptosystem [J].
Fabsic, Tomas ;
Hromada, Viliam ;
Stankovski, Paul ;
Zajac, Pavol ;
Guo, Qian ;
Johansson, Thomas .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 :51-68
[8]  
Farkas P, 2018, 2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), P241
[9]   A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors [J].
Guo, Qian ;
Johansson, Thomas ;
Stankovski, Paul .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :789-815
[10]   Fountain codes [J].
MacKay, DJC .
IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (06) :1062-1068