Reducing Key Length of the McEliece Cryptosystem

被引:0
|
作者
Berger, Thierry P. [1 ]
Cayrel, Pierre-Louis [2 ]
Gaborit, Philippe [1 ]
Otmani, Ayoub [3 ]
机构
[1] Univ Limoges, XLIM DMI, 123 Av Albert Thomas, F-87060 Limoges, France
[2] Univ Paris 08, Dept Math, F-93526 St Denis, France
[3] Univ Caen, GREYC Ensicaen, F-10450 Caen, France
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009 | 2009年 / 5580卷
关键词
public-key cryptography; McEliece cryptosystem; Alternant code; quasi-cyclic; ALGORITHM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The McEliece cryptosystem is one of the oldest public-key cryptosystems ever designed. It is also the first public-key cryptosystem based on linear error-correcting codes. Its main advantage is to have very fast encryption and decryption functions. However it suffers from a major drawback. It requires a very large public key which makes it very difficult to use in many practical situations. A possible solution is to advantageously use quasi-cyclic codes because of their compact representation. On the other hand, for a fixed level of security, the use of optimal codes like Maximum Distance Separable ones allows to use smaller codes. The almost only known family of MDS codes with an efficient decoding algorithm is the class of Generalized Reed-Solomon (GRS) codes. However, it is well-known that GRS codes and quasi-cyclic codes do not represent secure solutions. In this paper we propose a new general method to reduce the public key size by constructing quasi-cyclic Alternant codes over a relatively small field like F-28 . We introduce a new method of hiding the structure of a quasi-cyclic GRS code. The idea is to start from a Reed-Solomon code in quasi-cyclic form defined over a large field. We then apply three transformations that preserve the quasi-cyclic feature. First, we randomly block shorten the RS code. Next, we transform it to get a Generalised Reed Solomon, mid lastly we take the subfield subcode over a smaller field. We show that all existing structural attacks are infeasible. We also introduce a new NP-complete decision problem called quasi-cyclic syndrome decoding. This result suggests that decoding attack against our variant has little chance to be better than the general one against the classical McEliece cryptosystem. We propose a system with several sizes of parameters from 6,800 to 20,000 bits with a security ranging from 2(80) to 2(120).
引用
收藏
页码:77 / +
页数:4
相关论文
共 50 条
  • [31] About One Modification of McEliece Cryptosystem based on Plotkin Construction
    Krouk, Evgenii
    Ovchinnikov, Andrei
    Vostokova, Elizaveta
    2016 XV INTERNATIONAL SYMPOSIUM PROBLEMS OF REDUNDANCY IN INFORMATION AND CONTROL SYSTEMS (REDUNDANCY), 2016, : 75 - 78
  • [32] An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes
    Landais, Gregory
    Tillich, Jean-Pierre
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 102 - 117
  • [33] A Modified McEliece Public-Key Cryptosystem Based On Irregular Codes Of QC-LDPC And QC-MDPC
    Hashemi, Seyed Hesam Odin
    Hodtani, Ghosheh Abed
    2019 27TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2019), 2019, : 1373 - 1376
  • [34] Differential Power Analysis Attack on the Secure Bit Permutation in the McEliece Cryptosystem
    Petrvalsky, Martin
    Richmond, Tania
    Drutarovsky, Milos
    Cayrel, Pierre-Louis
    Fischer, Viktor
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2016), 2016, : 132 - 137
  • [35] A New variant of the McEliece cryptosystem based on the Smith form of convolutional codes
    Moufek, Hamza
    Guenda, Kenza
    CRYPTOLOGIA, 2018, 42 (03) : 227 - 239
  • [36] A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
    Baldi, Marco
    Bodrato, Marco
    Chiaraluce, Franco
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 246 - +
  • [37] A new code-based digital signature based on the McEliece cryptosystem
    Makoui, Farshid Haidary
    Gulliver, Thomas Aaron
    Dakhilalian, Mohammad
    IET COMMUNICATIONS, 2023, 17 (10) : 1199 - 1207
  • [38] Effective attack on the McEliece cryptosystem based on Reed-Muller codes
    Borodin, Mikhail A.
    Chizhov, Ivan V.
    DISCRETE MATHEMATICS AND APPLICATIONS, 2014, 24 (05) : 273 - 280
  • [39] A Speed Area Optimized Embedded Co-processor for McEliece Cryptosystem
    Ghosh, Santosh
    Delvaux, Jeroen
    Uhsadel, Leif
    Verbauwhede, Ingrid
    2012 IEEE 23RD INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2012, : 102 - 108
  • [40] New McEliece cryptosystem based on non-permutation equivalent polar codes
    Imine, Belkacem
    Hadj-Said, Naima
    Ali-Pacha, Adda
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (01) : 103 - 114