On the security of the McEliece public-key cryptosystern

被引:0
|
作者
Sendrier, N [1 ]
机构
[1] INRIA Rocquencourt, Project CODES, F-78153 Le Chesnay, France
来源
关键词
Public-key cryptography; McEliece cryptosystem; Niedereitter cryptosystem; error correcting codes; Goppa codes; syndrome decoding; proof of security; digital signature;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As RSA, the McEliece public-key cryptosystem has successfully resisted more than 20 years of cryptanalysis effort. However, despite the fact that it is faster, it was not as successful as RSA as far as applications are concerned. This is certainly due to its very large public key and probably also to the belief that the system could not be used for the design of a digital signature scheme. We present here the state of art of the implementation and the security of the two main variants of code-based public-key encryption schemes (McEliece's and Niedereitter's) as well as the more recent signature scheme derived from them. We also show how it is possible to formally reduce the security of these systems to two well identified algorithmic problems. The decoding attack (aimed on one particular ciphertext) is connected to the NP-complete syndrome decoding problem. The structural attack (aimed on the public key) is connected to the problem of distinguishing binary Goppa codes from random codes. We conjecture that both these problems are difficult and present some arguments to support this claim.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [41] A Modified McEliece Public Key Encryption System with a Higher Security Level
    Zhang, Ke
    Tomlinsin, Martin
    Ahmed, Mohammed Zaki
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 991 - 996
  • [42] Security and reliability of LDPC based public-key cryptosystems
    Saad, D
    Skantzos, NS
    Kabashima, Y
    PROGRESS OF THEORETICAL PHYSICS SUPPLEMENT, 2005, (157): : 229 - 236
  • [43] A CRITICAL ANALYSIS OF THE SECURITY OF KNAPSACK PUBLIC-KEY ALGORITHMS
    DESMEDT, YG
    VANDEWALLE, JP
    GOVAERTS, RJM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1984, 30 (04) : 601 - 611
  • [44] The Mobile payment based on public-key security technology
    Sun, Jiabin
    Zhang, Nan
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [45] Using public-key infrastructures for security and risk management
    Wing, P
    O'Higgins, B
    IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (09) : 71 - 73
  • [46] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [47] Security of the Niderreiter Form of the GPT public-key cryptosystem
    Berger, T
    Loidreau, P
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 267 - 267
  • [48] New security notions and relations for public-key encryption
    Sepahi, Reza
    Pieprzyk, Josef
    Shahandashti, Siamak F.
    Schoenmakers, Berry
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (3-4) : 183 - 227
  • [49] Key Privacy in McEliece Public Key Cryptosystem
    Wang, Qiang
    Qiu, Xue
    Zhang, Quan
    Tang, Chaojing
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 824 - 828
  • [50] Public-key based security scheme for wireless sensor network
    Chen, Jiann-Liang
    Lai, Yin-Fu
    Lu, Hsi-Feng
    Kuo, Quan-Cheng
    2008 IEEE RADIO AND WIRELESS SYMPOSIUM, VOLS 1 AND 2, 2008, : 255 - 258