Security of GPT-like public-key cryptosystems based on linear rank codes

被引:3
|
作者
Kshevetskiy, Alexander [1 ]
机构
[1] Moscow Inst Phys & Technol, Moscow, Russia
关键词
cryptography; linear rank codes;
D O I
10.1109/IWSDA.2007.4408344
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent structural attacks on the GPT cryptosystem and variants are reviewed. The equivalency of different forms of cryptosystems is shown and the general form for the purpose of cryptanalysis is stated. The published structural attacks are turned out to be either polynomial, or exponential, depending on parameters of the cryptosystem. The secure choice of parameters is suggested for avoiding polynomial attacks.
引用
收藏
页码:143 / +
页数:2
相关论文
共 50 条
  • [1] Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes
    Calkavur, Selda
    ENTROPY, 2022, 24 (04)
  • [2] Security and reliability of LDPC based public-key cryptosystems
    Saad, D
    Skantzos, NS
    Kabashima, Y
    PROGRESS OF THEORETICAL PHYSICS SUPPLEMENT, 2005, (157): : 229 - 236
  • [3] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [4] More on security of public-key cryptosystems based on Chebyshev polynomials
    Cheong, Kai Y.
    Koshiba, Takeshi
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2007, 54 (09) : 795 - 799
  • [5] Lattice-based public-key cryptosystems and security analysis
    Huang, Qiong
    Zhao, Yiming
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (10): : 60 - 62
  • [6] Security of the Niderreiter Form of the GPT public-key cryptosystem
    Berger, T
    Loidreau, P
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 267 - 267
  • [7] Public-key cryptosystems based on cubic curves
    Koyama, Kenji
    Kuwakado, Hidenori
    Tsuruoka, Yukio
    NTT R and D, 1995, 44 (10): : 91 - 98
  • [8] Coalition public-key cryptosystems
    Anisimov A.V.
    Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [9] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [10] On the security of biquadratic C∗ public-key cryptosystems and its generalizations
    Patrick Felke
    Cryptography and Communications, 2019, 11 : 427 - 442