Filters








148 Hits in 4.6 sec

McNie: A code-based public-key cryptosystem [article]

Jon-Lark Kim, Young-Sik Kim, Lucky Galvez, Myeong Jae Kim, Nari Lee
2019 arXiv   pre-print
In particular, we apply rank-metric codes to McNie.  ...  McNie is a hybrid version of the McEliece and Niederreiter cryptosystems and its security is reduced to the hard problem of syndrome decoding.  ...  Berger, T. and Loidreau, P.: Designing an efficient and secure public-key cryptosystem based on reducible rank codes. In: Canteaut A., Viswanathan K.  ... 
arXiv:1812.05008v2 fatcat:wsagwr4tofd3fdn2cxpp3vogte

Rank-Metric Codes and Their Applications

Hannes Bartz, Lukas Holzbaur, Hedongliang Liu, Sven Puchinger, Julian Renner, Antonia Wachter-Zeh
2022 Foundations and Trends in Communications and Information Theory  
Codes designed for the rank metric have attracted considerable attention in recent years, reinforced by network coding and further motivated by a variety of applications.  ...  This survey gives a general introduction to rank-metric codes, explains their most important applications, and highlights their relevance to these areas of research.  ...  First, hard problems which can be used to design rank-metric code-based cryptosystems are considered.  ... 
doi:10.1561/0100000119 fatcat:4wh62agk5rczpjlfr5bp3km67u

Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes [article]

Wenshuo Guo, Fang-Wei Fu
2022 arXiv   pre-print
This paper presents two public key cryptosystems based on the so-called expanded Gabidulin codes, which are constructed by expanding Gabidulin codes over the base field.  ...  To achieve the security of 256 bits, for instance, a public key size of 37583 bytes is enough for our first proposal, while around 1044992 bytes are needed for Classic McEliece selected as a candidate  ...  In [36] Loidreau designed another rank metric based cryptosystem in the McEliece setting, where a column-mixing transformation was imposed to the underlying code with the inverse of an invertible matrix  ... 
arXiv:2107.01610v3 fatcat:7j5h2bq5nzdr3bjsw3ktmqfhle

A New Rank Metric Codes Based Encryption Scheme [chapter]

Pierre Loidreau
2017 Lecture Notes in Computer Science  
We design a new McEliece-like rank metric based encryption scheme from Gabidulin codes. We explain why it is not affected by the invariant subspace attacks also known as Overbeck's attacks.  ...  The idea of the design mixes two existing approaches designing rank metric based encryption schemes.  ...  design of rank metric codes based cryptosystems.  ... 
doi:10.1007/978-3-319-59879-6_1 fatcat:kqdhhgfszbfinpdfbdu24af6wy

Modified Niederreiter type of GPT cryptosystem based on reducible rank codes

Eraj Khan, Ernst Gabidulin, Bahram Honary, Hassan Ahmed
2012 Designs, Codes and Cryptography  
In this paper, we have proposed a modified Niederreiter type GPT cryptosystem based on reducible rank codes by properly choosing the column scrambler matrix to withstand these attacks.  ...  GPT public key cryptosystem was proposed by Gabidulin, Paramonov and Tretjakov in 1991 . This cryptosystem is based on rank error correcting codes.  ...  Introduction In 1978, McEliece proposed a public key cryptosystem based on algebraic coding theory [1] . McEliece utilized the difficulty of solving a general decoding problem.  ... 
doi:10.1007/s10623-012-9757-4 fatcat:ghqce76x6fceritn6omwn63u5q

McNie2-Gabidulin: An improvement of McNie public key encryption using Gabidulin code [article]

Jon-Lark Kim, Young-Sik Kim, Lucky Galvez, Myeong Jae Kim
2018 arXiv   pre-print
McNie is a code-based public key encryption scheme submitted as a candidate to the NIST Post-Quantum Cryptography standardization. In this paper, we present McNie2-Gabidulin, an improvement of McNie.  ...  Suggested parameters are also given which provides low key sizes compared to other known code based cryptosystems with zero decryption failure probability.  ...  Introduction McNie [8] is a code-based public key encryption (PKE) scheme based on the McEliece and Niederreiter cryptosystems.  ... 
arXiv:1812.05015v1 fatcat:cjuskymcj5e3nnnrjz6jmxva5y

DRANKULA: A McEliece-like Rank Metric based Cryptosystem Implementation

Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Victor Mateu
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
We present and analyze the performance of DRANKULA, a McEliece-like cryptosystem implementation using rank metric instead of Hamming distance.  ...  Moreover, we argue how to have a practical and side-channel resistant version of the cryptosystem.  ...  proposed the GPT cryptosystem, a McEliece-like cryptosystem based on Rank metric (Gabidulin et al., 1991) .  ... 
doi:10.5220/0006838102300241 dblp:conf/icete/AbdouliABCHMM18 fatcat:kvohfmb4drfljkh6t3o7y47phq

Enhanced Public Key Security for the McEliece Cryptosystem

Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani
2014 Journal of Cryptology  
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutationequivalent to the secret code.  ...  cryptosystem for security reasons.  ...  However, in order to preserve the ability to correct the intentional error vectors, the GPT cryptosystem works in the rank metric domain and adopts rank distance codes, as Gabidulin codes.  ... 
doi:10.1007/s00145-014-9187-8 fatcat:pmm5kpz5jfeelo7uah74ualdlu

Enhanced public key security for the McEliece cryptosystem [article]

Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal and Davide Schipani
2014 arXiv   pre-print
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation-equivalent to the secret code.  ...  cryptosystem for security reasons.  ...  However, in order to preserve the ability to correct the intentional error vectors, the GPT cryptosystem works in the rank metric domain and adopts rank distance codes, like Gabidulin codes.  ... 
arXiv:1108.2462v4 fatcat:wlrekb63qzdb7neitzrw55vk2q

Variations of the McEliece Cryptosystem [article]

Jessalyn Bolkema, Heide Gluesing-Luerssen, Christine A. Kelley, Kristin Lauter, Beth Malmskog, Joachim Rosenthal
2017 arXiv   pre-print
Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process.  ...  These codes are known for their excellent error-correction performance and allow for a relatively low key size in the cryptosystem.  ...  A similar idea has been employed before in the context of rank-metric codes by Gabidulin et al.  ... 
arXiv:1612.05085v2 fatcat:iotsnlu6qzdqjpatxcv2vmvrqe

Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes [article]

Philippe Gaborit and Ayoub Otmani and Hervé Talé Kalachi
2017 arXiv   pre-print
In 2005 Faure and Loidreau designed a rank-metric encryption scheme which was not in the McEliece setting.  ...  Encryption schemes based on the rank metric lead to small public key sizes of order of few thousands bytes which represents a very attractive feature compared to Hamming metric-based encryption schemes  ...  Besides the McEliece setting used with Gabidulin codes, Faure and Loidreau proposed in [FL05] another approach for designing rank-metric encryption scheme based on Gabidulin codes.  ... 
arXiv:1606.07760v2 fatcat:cdl757yeavb2pebzu5xxeyptna

Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code

2019 KSII Transactions on Internet and Information Systems  
The proposed scheme has a small key size and is able to resist DPA attacks. In this paper, a novel McEliece cryptosystem based on the QD-MDPC code is demonstrated.  ...  To address this problem, a higher-order masking scheme for a McEliece cryptosystem based on the quasi-dyadic moderate density parity check (QD-MDPC) code has been proposed.  ...  A McEliece cryptosystem based on the QD-MDPC code is then constructed.  ... 
doi:10.3837/tiis.2019.02.033 fatcat:h3yvlbjywjc5hixygygj6j7ozi

Cryptanalysis of a System Based on Twisted Reed-Solomon Codes [article]

Julien Lavauzelle, Julian Renner
2019 arXiv   pre-print
As a consequence, they were proposed as an alternative to Goppa codes for the McEliece cryptosystem, resulting to a potential reduction of key sizes.  ...  In this paper, an efficient key-recovery attack is given on this variant of the McEliece cryptosystem.  ...  We would further like to thank the authors of the proposed cryptosystem [4] for validating our attack and pointing out a possible repair of the system with respect to our attack.  ... 
arXiv:1904.11785v1 fatcat:p7svrf6jvbeklofshvqnr4hjyy

Recent Progress in Code-Based Cryptography [chapter]

Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr
2011 Communications in Computer and Information Science  
Section 3 deals with the new improvements of code-based signature schemes and Section 4 presents the new results in code-based secret-key cryptography.  ...  The last three years have witnessed tremendous progress in the understanding of code-based cryptography.  ...  [68] cryptanalyzed a McEliece cryptosystem based on QC LDPC codes.  ... 
doi:10.1007/978-3-642-23141-4_3 fatcat:tydg6d5zunhbplpchcnozoaanm

Rank-Metric Codes and Their Applications [article]

Hannes Bartz, Lukas Holzbaur, Hedongliang Liu, Sven Puchinger, Julian Renner, Antonia Wachter-Zeh
2022 arXiv   pre-print
Codes designed for the rank metric have attracted considerable attention in recent years, reinforced by network coding and further motivated by a variety of applications.  ...  This survey gives a general introduction to rank-metric codes, explains their most important applications, and highlights their relevance to these areas of research.  ...  Holzbaur and A. Wachter  ... 
arXiv:2203.12384v1 fatcat:brysqya7ynem5i25adxfwf5vl4
« Previous Showing results 1 — 15 out of 148 results