Filters








353 Hits in 33.9 sec

Weak keys in the McEliece public-key cryptosystem

P. Loidreau, N. Sendrier
2001 IEEE Transactions on Information Theory  
We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was chosen with a binary generator polynomial.  ...  Furthermore, whenever such a weak key is used, we present an attack which can be completed, for codes of length 1024 and dimension 524, with a large, but feasible amount of computation.  ...  Weak keys in the McEliece cryptosystem When the hidden Goppa code in an instance of the McEliece cryptosystem has a binary generator polynomial, applying the support splitting algorithm to the public key  ... 
doi:10.1109/18.915687 fatcat:winbq5r2hrhhzktv2b273w66zi

MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes

Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto
2013 2013 IEEE International Symposium on Information Theory  
The pseudo-randomness, in fact the key security, is often the weak spot even for Goppa codes. In [10] a distinguisher for high rate Goppa codes is presented.  ...  In order to avoid attacks aimed at recovering such codewords, these last proposals have suggested to replace the permutation matrix used in the original McEliece cryptosystem by an n × n matrix Q of small  ...  The pseudo-randomness, in fact the key security, is often the weak spot even for Goppa codes. In [10] a distinguisher for high rate Goppa codes is presented.  ... 
doi:10.1109/isit.2013.6620590 dblp:conf/isit/MisoczkiTSB13 fatcat:hkeuja3b6rhgtm3xruezsfx244

Enhanced Public Key Security for the McEliece Cryptosystem

Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani
2014 Journal of Cryptology  
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutationequivalent to the secret code.  ...  McEliece cryptosystem for security reasons.  ...  Acknowledgment The authors would like to thank Jean-Pierre Tillich and Ayoub Otmani for having pointed out the subcode vulnerability for the private code.  ... 
doi:10.1007/s00145-014-9187-8 fatcat:pmm5kpz5jfeelo7uah74ualdlu

Post-quantum cryptography-driven security framework for cloud computing

Henry Chima Ukwuoma, Gabriel Arome, Aderonke Thompson, Boniface Kayode Alese
2022 Open Computer Science  
The article proposes a model that comprises the application of a variant of McEliece cryptosystem, which has been tipped to replace Rivest–Shamir–Adleman (RSA) in the quantum computing era to secure access  ...  The simulation of the proposed McEliece algorithm showed that the algorithm has a better time complexity than the existing McEliece cryptosystem.  ...  Calculate the transpose of S and P (G key , P k ) End In the above algorithm, the sender sets the public key as is the encryption algorithm for proposed McEliece cryptosystem.  ... 
doi:10.1515/comp-2022-0235 fatcat:hexuew645be2laxfpknbfgrwfm

Improving the Security of the McEliece Public-Key Cryptosystem [chapter]

Hung -Min Sun
1998 Lecture Notes in Computer Science  
At Crypt'97, Berson showed that the McEliece public-key cryptosystem suffers from two weaknesses: (1) failure to protect any message which is encrypted more than once, (2) failure to protect any messages  ...  In this paper, we propose some variants of the McEliece scheme which can prevent from these attacks. These variants will not reduce the information rate in the original scheme.  ...  Introduction In 1978, McEliece [16] proposed a public-key cryptosystem (the McEliece scheme) based on algebraic coding theory.  ... 
doi:10.1007/3-540-49649-1_17 fatcat:o2scv57pardgvgjrzkfsvybtnu

How to Backdoor (Classical) McEliece and How to Guard Against Backdoors [article]

Alexander May, Carl Richard Theodor Schneider
2022 IACR Cryptology ePrint Archive  
We show how to backdoor the McEliece cryptosystem, such that a backdoored public key is indistinguishable from a usual public key, but allows to efficiently retrieve the underlying secret key.  ...  Our backdoor mechanism works by encoding the encryption of δ into the public key. Retrieving δ then allows to efficiently recover the (backdoored) secret key.  ...  A SETUP mechanism allows an adversary A to encode during the key generation process of a public key cryptosystem information into the public key, that allows A to later retrieve the underlying secret key  ... 
dblp:journals/iacr/MayS22 fatcat:hgijdfctwrchrmgyyvraze6mtm

Network Coding-Based Post-Quantum Cryptography [article]

Alejandro Cohen, Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Medard
2020 arXiv   pre-print
In addition, the scheme is general and can be applied to any communication network, and to any public-key cryptosystem.  ...  The secure network-coding scheme we offer is hybrid in the sense that it combines information-theory security with public-key cryptography.  ...  It is important to note that unlike in public-key cryptosystems, and in particular the McEliece cryptosystem, in physical-layer security schemes, the generation matrix and the code is public.  ... 
arXiv:2009.01931v1 fatcat:yzfyeyk6n5capibpu7pcagdx6i

McEliece/Niederreiter PKC: Sensitivity to Fault Injection

Pierre-Louis Cayrel, Pierre Dusart
2010 2010 5th International Conference on Future Information Technology  
The McEliece and Niederreiter public key cryptosystems (PKC) are presumed secure in a post quantum world [4] because there is no efficient quantum algorithm that solves the hard problems upon which these  ...  We present the injection fault in the McEliece scheme using Goppa codes and in two variants using quasi-cyclic alternant and quasi-dyadic codes, and describe the main difference of those constructions  ...  INTRODUCTION In 1978, R. J. McEliece presented the first version of the cryptosystem which was to become the reference in coding-theory-based public key cryptography [14] .  ... 
doi:10.1109/futuretech.2010.5482663 fatcat:ldkz42yj35elzdcn3vk42unohu

Post-Quantum Network Security:McEliece and Niederreiter Cryptosystems Analysis and Education Issues

2020 WSEAS transactions on systems and control  
The cipher metrics, which are considered in the paper, includecryptographic strength, performance, public key size and length of ciphertext.  ...  The paper is aimed at analyzing of the classical McEliece and Niederreiter cryptosystems as well as theQuasi-Cyclic MDPC McEliece cipher in a context of the post-quantum network security.  ...  CriCTechS seminar for discussion of the presented results.  ... 
doi:10.37394/23203.2020.15.62 fatcat:ycx2ry6l2bdvbeqr5qudu5uhb4

Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks [article]

Rafael G. L. D'Oliveira, Alejandro Cohen, John Robinson, Thomas Stahlbuhk, Muriel Médard
2021 arXiv   pre-print
Under this scenario, we compare LL-HUNCC to the state-of-the-art where all communication paths are encrypted via a post-quantum public-key cryptosystem.  ...  In this setting, previous work has looked, individually, at the trade-offs between in-order delivery delay and throughput, and between security and throughput.  ...  A public-key cryptosystem consists of an encryption function Enc(·), a decryption function Dec(·), a secret key s, and a public key p. Both keys are generated by Bob.  ... 
arXiv:2108.06409v1 fatcat:56cqe2sv2bcabncfjfy2z7xvya

PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes [article]

Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
2017 arXiv   pre-print
This paper studies a variant of the McEliece public key cryptosystem based on polar codes, called "PKC-PC".  ...  to the McEliece cryptosystem.  ...  In this paper, a secure and reliable polar code-based public key scheme is introduced to resolve the weaknesses of the original McEliece scheme.  ... 
arXiv:1712.07672v1 fatcat:tbwh5oagvze3bixmk4rdl2qdey

Reducing Key Length of the McEliece Cryptosystem [chapter]

Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani
2009 Lecture Notes in Computer Science  
The McEliece cryptosystem is one of the oldest public-key cryptosystem ever designated. It is also the first public-key cryptosystem based on linear error-correcting codes.  ...  In this paper we propose a new general way to reduce the public key size through quasi-cyclic codes.  ...  If we consider irreducible binary Goppa codes then there is no efficient algorithm that extracts the secret key from the public key in the McEliece or the Niederreiter cryptosystem provided that weak keys  ... 
doi:10.1007/978-3-642-02384-2_6 fatcat:tdu7qveerjhclpbh3l4i4gmilm

Enhanced public key security for the McEliece cryptosystem [article]

Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal and Davide Schipani
2014 arXiv   pre-print
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation-equivalent to the secret code.  ...  McEliece cryptosystem for security reasons.  ...  Acknowledgment The authors would like to thank Jean-Pierre Tillich and Ayoub Otmani for having pointed out the subcode vulnerability for the private code.  ... 
arXiv:1108.2462v4 fatcat:wlrekb63qzdb7neitzrw55vk2q

Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code

2019 KSII Transactions on Internet and Information Systems  
The proposed scheme has a small key size and is able to resist DPA attacks. In this paper, a novel McEliece cryptosystem based on the QD-MDPC code is demonstrated.  ...  The key size of this novel cryptosystem is reduced by 78 times, which meets the requirements of embedded devices.  ...  In 1978, the original code-based cryptosystem, the McEliece public cryptosystem based on the Goppa code, was proposed [3] .  ... 
doi:10.3837/tiis.2019.02.033 fatcat:h3yvlbjywjc5hixygygj6j7ozi

McNie: A code-based public-key cryptosystem [article]

Jon-Lark Kim, Young-Sik Kim, Lucky Galvez, Myeong Jae Kim, Nari Lee
2019 arXiv   pre-print
The public key involves a random generator matrix which is also used to mask the code used in the secret key. This makes the system safer against known structural attacks.  ...  In this paper, we suggest a code-based public key encryption scheme, called McNie.  ...  .: Semantically secure McEliece public-key cryptosystems- conversions for McEliece PKC. Public Key Cryptography vol. 1992, pp. 19–35 (2001) 29.  ... 
arXiv:1812.05008v2 fatcat:wsagwr4tofd3fdn2cxpp3vogte
« Previous Showing results 1 — 15 out of 353 results