Reducing Key Length of the McEliece Cryptosystem

被引:0
|
作者
Berger, Thierry P. [1 ]
Cayrel, Pierre-Louis [2 ]
Gaborit, Philippe [1 ]
Otmani, Ayoub [3 ]
机构
[1] Univ Limoges, XLIM DMI, 123 Av Albert Thomas, F-87060 Limoges, France
[2] Univ Paris 08, Dept Math, F-93526 St Denis, France
[3] Univ Caen, GREYC Ensicaen, F-10450 Caen, France
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009 | 2009年 / 5580卷
关键词
public-key cryptography; McEliece cryptosystem; Alternant code; quasi-cyclic; ALGORITHM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The McEliece cryptosystem is one of the oldest public-key cryptosystems ever designed. It is also the first public-key cryptosystem based on linear error-correcting codes. Its main advantage is to have very fast encryption and decryption functions. However it suffers from a major drawback. It requires a very large public key which makes it very difficult to use in many practical situations. A possible solution is to advantageously use quasi-cyclic codes because of their compact representation. On the other hand, for a fixed level of security, the use of optimal codes like Maximum Distance Separable ones allows to use smaller codes. The almost only known family of MDS codes with an efficient decoding algorithm is the class of Generalized Reed-Solomon (GRS) codes. However, it is well-known that GRS codes and quasi-cyclic codes do not represent secure solutions. In this paper we propose a new general method to reduce the public key size by constructing quasi-cyclic Alternant codes over a relatively small field like F-28 . We introduce a new method of hiding the structure of a quasi-cyclic GRS code. The idea is to start from a Reed-Solomon code in quasi-cyclic form defined over a large field. We then apply three transformations that preserve the quasi-cyclic feature. First, we randomly block shorten the RS code. Next, we transform it to get a Generalised Reed Solomon, mid lastly we take the subfield subcode over a smaller field. We show that all existing structural attacks are infeasible. We also introduce a new NP-complete decision problem called quasi-cyclic syndrome decoding. This result suggests that decoding attack against our variant has little chance to be better than the general one against the classical McEliece cryptosystem. We propose a system with several sizes of parameters from 6,800 to 20,000 bits with a security ranging from 2(80) to 2(120).
引用
收藏
页码:77 / +
页数:4
相关论文
共 50 条
  • [21] An Efficient Decoding of Goppa Codes for the McEliece Cryptosystem
    Lim, Seongan
    Lee, Hyang-Sook
    Choi, Mijin
    FUNDAMENTA INFORMATICAE, 2014, 133 (04) : 387 - 397
  • [22] Semantic security for the McEliece cryptosystem without random oracles
    Nojima, Ryo
    Imai, Hideki
    Kobara, Kazukuni
    Morozov, Kirill
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 49 (1-3) : 289 - 305
  • [23] Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem
    Chen, Cong
    Eisenbarth, Thomas
    von Maurich, Ingo
    Steinwandt, Rainer
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1093 - 1105
  • [24] A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms
    Shoufan, Abdulhadi
    Wink, Thorsten
    Molter, Gregor
    Huss, Sorin
    Strentzke, Falko
    2009 20TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2009, : 98 - +
  • [25] A CCA2 Secure Variant of the McEliece Cryptosystem
    Doettling, Nico
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (10) : 6672 - 6680
  • [26] Hard Reliability-Based Ordered Statistic Decoding and Its Application to McEliece Public Key Cryptosystem
    Yu, Shuyan
    Huang, Qin
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (03) : 490 - 494
  • [27] Efficient Implementation of McEliece Cryptosystem on Graphic Processing Unit
    Elsobky, Alaa Mahmoud
    Farag, Abdelalim Kamal
    Keshk, Arabi
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 247 - 253
  • [28] Semantic security for the McEliece cryptosystem without random oracles
    Ryo Nojima
    Hideki Imai
    Kazukuni Kobara
    Kirill Morozov
    Designs, Codes and Cryptography, 2008, 49 : 289 - 305
  • [29] On the security of the McEliece public-key cryptosystern
    Sendrier, N
    INFORMATION, CODING AND MATHEMATICS, 2002, 687 : 141 - 163
  • [30] Hindering reaction attacks by using monomial codes in the McEliece cryptosystem
    Santini, Paolo
    Baldi, Marco
    Cancellieri, Giovanni
    Chiaraluce, Franco
    2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 951 - 955